Záplatu KB835732 nemohu nainstalovat pod W2k protože: "Nelze ověřit integritu souboru Update.inf. Ujistěte se, zda je v počítači spuštěna služba šifrování." Poraďte prosím, co tím.
ZdravimPo nainstalovani zaplat dochazi, na stroji s Win2k a s deskou /ECS - K7SOM+ ; WD 20GB ; Duron 750 /, k automatickemu restartu jeste pred prihlasovacim oknem do Win. Pred samotnym restartem dojde k vypisu fyzicke pameti na disk v modre obrazovce. Deska ma cipset Sis 650. V nouzovem rezimu, i po spusteni posledni zname funkcni konfigurace, se to chova uplne stejne a tak nejsem schopen zaplatu odinstalovat.Zajimalo by me zdali se daji odebrat tyto zaplaty z disku po jeho pripojeni napr. k jinemu PC ???
Diky zdravi MF
Taky jsem v sobotu updatoval z mrkvosovtu (W2K CZ). Po restartu PC to v 3/4 náběhu Windows spadlo do bluescreen s výpisem chyba paměti na modulu x?x?x?. Nakonec mě HDD odešel do věčných lovišť - poškozený MBR, ještě jsem před tím stihl přelejt data na 2.HDD. Bachy na autoupdate od Billa !!! Raději počkat na CD nebo DVD verzi, kde je již vše ověřeno (mělo by být).
MBR si muzes v klidu opravit, ne? staci nabootovat s instal. CD, potom vybrat moznost opravit, bez zachanne diskety pomoci konzoly, tam si dej pak prikaz help a hledej primaz MBRFIX, podivej se na syntaxi a pouzij ho.
Pokud ti jde nabootovat v nouzovem rezimu, tak tam uz by nemel byt problem zaplaty odebrat. Jinak podobna vec se objevila u notebooku HP Xe3. Tam to bylo starsim driverem ke grafarne. Tak zkus aktualizovat ovladace (pokud teda nabootujes) :))
omg, kokoz ja som sa stym neska 4 hodiny mrdal... mam nervy... presne toto iste robilo, restart a mrd! modra obrazovka alebo restart, potom sa to rozbehlo, ... :), nastastie doma mam linux :)
Tak problem s nemoznosti se zalogovat do W2k CZ po aplikaci patche KB835732 na HPXe3 byl,zda se, odhalen a vyresen. Je chyba v ovladaci graficke karty Intel 82830M (v nekterych modelech Xe3 je gr. karta S3 a proto se to u nekoho na "stejnem notebooku" neprojevilo) U nas je verze 13.x a Intel vydal v 14.x se kterou uz vse funguje OK.
Po instalaci záplaty KB835732 se stala na některých počítačích nemilá věc - nenabootují, zůstanou viset před loginem. Pomůže nabootovat v nouzovém režimu a záplatu odstranit.Poangličtění českých windows pozoruji také, ale to je vada spíše kosmetická. Nakonec, v SP3 pro Office 2000 je dialog služby LDAP polsky... Utkvělo mi v paměti "vyszukawanie".
Ahoj, nevis prosim Te co s tim da delat, mam stjeny problem s tim KB835752
Díky
Chris
U českých Win2000 SP4 se změnily u okna Přidat nebo odebrat programy, Přidat nové programy a Nastavit přístup a výchozí hodnoty programu některé popisy z češtiny na angličtinu. Protože jsem záplaty instaloval všechny najednou, nevím po které z nich se to stalo. Samozřejmě, že to není žádná katastrofa, jen to signalizuje, že něco není na zmíněných opravách v pořádku.
V praci mam stejny system a mam to tam ted taky anglicky . Snad je to jediny bug.
Kdo ešte dnes zaznamenal problémy so službou "Windows Update"? Dnes mi to niekoľko krát spadlo a rýchlosť bola veľmi nízka. V súčasnosti to už ide o niečo lepšie, ale aj tak nechápem.
To asi znamena, ze vic a vic lidi ma zapnutou automatickou aktualizaci.
Pokud mate ve WAB adresari narozeniny a vyroci, pak vezte, ze oprava pro Outlook Express SP1 zpusobi nasledujici zertik: v editaci jsou sice data stale spravne, ale zobrazeni v seznamu bude vzdy 1. leden. Coz potazmo znamena, ze i externi programy pro cteni udaju z adresare budou ukazovat tuto blbost.Takze slavny Mrkvosoft neco opravi jen za predpokladu, ze neco jineho zdrbe. Takze tuto "opravu" odinstalovavam.
[30 Dec 2003] DSA-405 xsok - missing privilege release[04 Dec 2003] DSA-404 rsync - heap overflow[01 Dec 2003] DSA-403 kernel-image-2.4.18-1-alpha, kernel-image-2.4.18-1-i386, kernel-source-2.4.18 - local root exploit[17 Nov 2003] DSA-402 minimalist - unsanitised input[17 Nov 2003] DSA-401 hylafax - format strings[11 Nov 2003] DSA-400 omega-rpg - buffer overflow[10 Nov 2003] DSA-399 epic4 - buffer overflow[10 Nov 2003] DSA-398 conquest - buffer overflow[07 Nov 2003] DSA-397 postgresql - buffer overflow[29 Oct 2003] DSA-396 thttpd - missing input sanitizing, wrong calculation[15 Oct 2003] DSA-395 tomcat4 - incorrect input handling[11 Oct 2003] DSA-394 openssl095 - ASN.1 parsing vulnerability[01 Oct 2003] DSA-393 openssl - denial of service[29 Sep 2003] DSA-392 webfs - buffer overflows, file and directory exposure[28 Sep 2003] DSA-391 freesweep - buffer overflow[26 Sep 2003] DSA-390 marbles - buffer overflow[20 Sep 2003] DSA-389 ipmasq - insecure packet filtering rules[19 Sep 2003] DSA-388 kdebase - several vulnerabilities[18 Sep 2003] DSA-387 gopher - buffer overflows[18 Sep 2003] DSA-386 libmailtools-perl - input validation bug[18 Sep 2003] DSA-385 hztty - buffer overflows[17 Sep 2003] DSA-384 sendmail - buffer overflows[17 Sep 2003] DSA-383 ssh-krb5 - possible remote vulnerability[16 Sep 2003] DSA-382 ssh - possible remote vulnerability[13 Sep 2003] DSA-381 mysql - buffer overflow[12 Sep 2003] DSA-380 xfree86 - buffer overflows, denial of service[11 Sep 2003] DSA-379 sane-backends - several vulnerabilities[07 Sep 2003] DSA-378 mah-jong - buffer overflows, denial of service[04 Sep 2003] DSA-377 wu-ftpd - insecure program execution[04 Sep 2003] DSA-376 exim - buffer overflow[29 Aug 2003] DSA-375 node - buffer overflow, format string[26 Aug 2003] DSA-374 libpam-smb - buffer overflow[16 Aug 2003] DSA-373 autorespond - buffer overflow[16 Aug 2003] DSA-372 netris - buffer overflow[11 Aug 2003] DSA-371 perl - cross-site scripting[08 Aug 2003] DSA-370 pam-pgsql - format string[08 Aug 2003] DSA-369 zblast - buffer overflow[08 Aug 2003] DSA-368 xpcd - buffer overflow[08 Aug 2003] DSA-367 xtokkaetama - buffer overflow[05 Aug 2003] DSA-366 eroaster - insecure temporary file[05 Aug 2003] DSA-365 phpgroupware - several vulnerabilities[04 Aug 2003] DSA-364 man-db - buffer overflows, arbitrary command execution[03 Aug 2003] DSA-363 postfix - denial of service, bounce-scanning[02 Aug 2003] DSA-362 mindi - insecure temporary file[01 Aug 2003] DSA-361 kdelibs, kdelibs-crypto - several vulnerabilities[01 Aug 2003] DSA-360 xfstt - several vulnerabilities[31 Jul 2003] DSA-359 atari800 - buffer overflows[31 Jul 2003] DSA-358 linux-kernel-2.4.18 - several vulnerabilities[31 Jul 2003] DSA-357 wu-ftpd - remote root exploit[30 Jul 2003] DSA-356 xtokkaetama - buffer overflows[30 Jul 2003] DSA-355 gallery - cross-site scripting[29 Jul 2003] DSA-354 xconq - buffer overflows[29 Jul 2003] DSA-353 sup - insecure temporary file[22 Jul 2003] DSA-352 fdclone - insecure temporary directory[16 Jul 2003] DSA-351 php4 - cross-site scripting[15 Jul 2003] DSA-350 falconseye - buffer overflow[14 Jul 2003] DSA-349 nfs-utils - buffer overflow[11 Jul 2003] DSA-348 traceroute-nanog - integer overflow, buffer overflow[08 Jul 2003] DSA-347 teapop - SQL injection[08 Jul 2003] DSA-346 phpsysinfo - directory traversal[08 Jul 2003] DSA-345 xbl - buffer overflow[08 Jul 2003] DSA-344 unzip - directory traversal[08 Jul 2003] DSA-343 skk, ddskk - insecure temporary file[07 Jul 2003] DSA-342 mozart - unsafe mailcap configuration[07 Jul 2003] DSA-341 liece - insecure temporary file[06 Jul 2003] DSA-340 x-face-el - insecure temporary file[06 Jul 2003] DSA-339 semi - insecure temporary file[29 Jun 2003] DSA-338 proftpd - SQL injection[29 Jun 2003] DSA-337 gtksee - buffer overflow[29 Jun 2003] DSA-336 linux-kernel-2.2.20 - several vulnerabilities[28 Jun 2003] DSA-335 mantis - incorrect permissions[28 Jun 2003] DSA-334 xgalaga - buffer overflows[27 Jun 2003] DSA-333 acm - integer overflow[27 Jun 2003] DSA-332 linux-kernel-2.4.17 - several vulnerabilities[27 Jun 2003] DSA-331 imagemagick - insecure temporary file[23 Jun 2003] DSA-330 tcptraceroute - failure to drop root privileges[20 Jun 2003] DSA-329 osh - buffer overflows[19 Jun 2003] DSA-328 webfs - buffer overflow[19 Jun 2003] DSA-327 xbl - buffer overflows[19 Jun 2003] DSA-326 orville-write - buffer overflows[19 Jun 2003] DSA-325 eldav - insecure temporary file[18 Jun 2003] DSA-324 ethereal - several vulnerabilities[16 Jun 2003] DSA-323 noweb - insecure temporary files[16 Jun 2003] DSA-322 typespeed - buffer overflow[13 Jun 2003] DSA-321 radiusd-cistron - buffer overflow[13 Jun 2003] DSA-320 mikmod - buffer overflow[12 Jun 2003] DSA-319 webmin - session ID spoofing[12 Jun 2003] DSA-318 lyskom-server - denial of service[11 Jun 2003] DSA-317 cupsys - denial of service[11 Jun 2003] DSA-316 nethack - buffer overflow, incorrect permissions[11 Jun 2003] DSA-315 gnocatan - buffer overflows, denial of service[11 Jun 2003] DSA-314 atftp - buffer overflow[11 Jun 2003] DSA-313 ethereal - buffer overflows, integer overflows[09 Jun 2003] DSA-312 kernel-patch-2.4.18-powerpc - several vulnerabilities[08 Jun 2003] DSA-311 linux-kernel-2.4.18 - several vulnerabilities[08 Jun 2003] DSA-310 xaos - improper setuid-root execution[06 Jun 2003] DSA-309 eterm - buffer overflow[06 Jun 2003] DSA-308 gzip - insecure temporary files[27 May 2003] DSA-307 gps - multiple vulnerabilities[19 May 2003] DSA-306 ircii-pana - buffer overflows, integer overflow[15 May 2003] DSA-305 sendmail - insecure temporary files[15 May 2003] DSA-304 lv - privilege escalation[15 May 2003] DSA-303 mysql - privilege escalation[07 May 2003] DSA-302 fuzz - privilege escalation[07 May 2003] DSA-301 libgtop - buffer overflow[06 May 2003] DSA-300 balsa - buffer overflow[06 May 2003] DSA-299 leksbot - improper setuid-root execution[02 May 2003] DSA-298 epic4 - buffer overflows[01 May 2003] DSA-297 snort - integer overflow, buffer overflow[30 Apr 2003] DSA-296 kdebase - insecure execution[30 Apr 2003] DSA-295 pptpd - buffer overflow[23 Apr 2003] DSA-294 gkrellm-newsticker - missing quoting, incomplete parser[23 Apr 2003] DSA-293 kdelibs - insecure execution[22 Apr 2003] DSA-292 mime-support - insecure temporary file creation[22 Apr 2003] DSA-291 ircii - buffer overflows[17 Apr 2003] DSA-290 sendmail-wide - char-to-int conversion[17 Apr 2003] DSA-289 rinetd - incorrect memory resizing[17 Apr 2003] DSA-288 openssl - several vulnerabilities[15 Apr 2003] DSA-287 epic - buffer overflows[14 Apr 2003] DSA-286 gs-common - insecure temporary file[14 Apr 2003] DSA-285 lprng - insecure temporary file[12 Apr 2003] DSA-284 kdegraphics - insecure execution[11 Apr 2003] DSA-283 xfsdump - insecure file creation[09 Apr 2003] DSA-282 glibc - integer overflow[08 Apr 2003] DSA-281 moxftp - buffer overflow[07 Apr 2003] DSA-280 samba - buffer overflow[07 Apr 2003] DSA-279 metrics - insecure temporary file creation[04 Apr 2003] DSA-278 sendmail - char-to-int conversion[03 Apr 2003] DSA-277 apcupsd - buffer overflows, format string[03 Apr 2003] DSA-276 linux-kernel-s390 - local privilege escalation[02 Apr 2003] DSA-275 lpr-ppd - buffer overflow[28 Mar 2003] DSA-274 mutt - buffer overflow[28 Mar 2003] DSA-273 krb4 - Cryptographic weakness[28 Mar 2003] DSA-272 dietlibc - integer overflow[27 Mar 2003] DSA-271 ecartis - unauthorized password change[27 Mar 2003] DSA-270 linux-kernel-mips - local privilege escalation[26 Mar 2003] DSA-269 heimdal - Cryptographic weakness[25 Mar 2003] DSA-268 mutt - buffer overflow[24 Mar 2003] DSA-267 lpr - buffer overflow[24 Mar 2003] DSA-266 krb5 - several vulnerabilities[21 Mar 2003] DSA-265 bonsai - several vulnerabilities[19 Mar 2003] DSA-264 lxr - missing filename sanitizing[17 Mar 2003] DSA-263 netpbm-free - math overflow errors[15 Mar 2003] DSA-262 samba - remote exploit[14 Mar 2003] DSA-261 tcpdump - infinite loop[13 Mar 2003] DSA-260 file - buffer overflow[12 Mar 2003] DSA-259 qpopper - mail user privilege escalation[10 Mar 2003] DSA-258 ethereal - format string vulnerability[04 Mar 2003] DSA-257 sendmail - remote exploit[28 Feb 2003] DSA-256 mhc - insecure temporary file[27 Feb 2003] DSA-255 tcpdump - infinite loop[27 Feb 2003] DSA-254 traceroute-nanog - buffer overflow[24 Feb 2003] DSA-253 openssl - information leak[21 Feb 2003] DSA-252 slocate - buffer overflow[14 Feb 2003] DSA-251 w3m - missing HTML quoting[12 Feb 2003] DSA-250 w3mmee-ssl - missing HTML quoting[11 Feb 2003] DSA-249 w3mmee - missing HTML quoting[31 Jan 2003] DSA-248 hypermail - buffer overflows[30 Jan 2003] DSA-247 courier-ssl - missing input sanitizing[29 Jan 2003] DSA-246 tomcat - information exposure, cross site scripting[28 Jan 2003] DSA-245 dhcp3 - ignored counter boundary[27 Jan 2003] DSA-244 noffle - buffer overflows[24 Jan 2003] DSA-243 kdemultimedia - several vulnerabilities[24 Jan 2003] DSA-242 kdebase - several vulnerabilities[24 Jan 2003] DSA-241 kdeutils - several vulnerabilities[23 Jan 2003] DSA-240 kdegames - several vulnerabilities[23 Jan 2003] DSA-239 kdesdk - several vulnerabilities[23 Jan 2003] DSA-238 kdepim - several vulnerabilities[22 Jan 2003] DSA-237 kdenetwork - several vulnerabilities[22 Jan 2003] DSA-236 kdelibs - several vulnerabilities[22 Jan 2003] DSA-235 kdegraphics - several vulnerabilities[22 Jan 2003] DSA-234 kdeadmin - several vulnerabilities[21 Jan 2003] DSA-233 cvs - doubly freed memory[20 Jan 2003] DSA-232 cupsys - several vulnerabilities[17 Jan 2003] DSA-231 dhcp3 - stack overflows[16 Jan 2003] DSA-230 bugzilla - insecure permissions, spurious backup files[15 Jan 2003] DSA-229 imp - SQL injection[14 Jan 2003] DSA-228 libmcrypt - buffer overflows and memory leak[13 Jan 2003] DSA-227 openldap2 - buffer overflows and other bugs[10 Jan 2003] DSA-226 xpdf-i - integer overflow[09 Jan 2003] DSA-225 tomcat4 - source disclosure[08 Jan 2003] DSA-224 canna - buffer overflow and more[07 Jan 2003] DSA-223 geneweb - information exposure[06 Jan 2003] DSA-222 xpdf - integer overflow[03 Jan 2003] DSA-221 mhonarc - cross site scripting[02 Jan 2003] DSA-220 squirrelmail - cross site scripting
Z toho, cos jste tu vypsal, mám nainstalován jen zlomek. Druhá věc je, že příslušné opravy už jsou na světě a u těch novějších chyb budou taky velice rychle přístupné. Pro zajímavost se koukněte na rok uvedení Win98 a ještě dnes pro řadu věcí u nich oprava neexistuje a vlastně už ani existovat nebude.
Když nemáš v Linuxu skoro nic nainstalovanýho , tak co v něm děláš? Píšeš paměti v emacsu ??
trepes hluposti, vies o tom ?windows ma 14 remote exploitovatelnych dier v operacnom systemepred tym nez to zacnes porovnavat s linuxom, skus si tie linuxove sec advisories prestudovat a ponechat len tie ktore su jednak remote exploitovatelne, a potom sa tykaju komponenty ktora ma porovnatelnu obdobu v microsoft windows oscize sa skus obmedzit na kernel, X server, nejakeho mail klienta, par zakladnych utilitneviem o tom ze by mal windows standardne dodavany mail server, proxy server alebo tak ...alebo skus potom k 14 remote exploitovatelnym dieram priratat vsetky diery v ostatnom software pre windowskedze vacsina programov pre windows absolutne neimplementuje privilege separation a vsetko bezi pod power userom/administratorom, takmer kazda diera vo windows programe znamena okamzite plnu kontrolu nad pocitacom
Tohle vsechno znamena, ze i Linux ma sve chyby a mouchy; tj. neni to system neprustrelny a tak bozsky dokonaly...
kto tu kedy hovoril o dokonalosti ?kazdy rozsiahlejsi software ma nejake chyby, otazka je len ake vazne a ako sa k nim autori stavaju, ci sa snazia zahmlievate ako microsoft, alebo objektivne a otvorene o nich hovorit ako v pripade open sources linuxom ma clovek tu vyhodu ze on sam sa moze rozhodnut co si chce nainstalovat a co niemicrosoft ti nepovoli nenainstalovat internet explorer alebo rozne jeho rpc prasaciny, a tym padom potrebujes firewall alebo nieco podobne aby si ich chranil pred internetompokial si na linux nenanistalujes ziadne servery a pouzivas ho len na pristup von; si na tom co sa tyka bezpecnosti ovela lepsie nez s windowsomani nehovoriac o tom ze zrovnavat windows a linux firewall je ako porovnavat kolobezku s pretekarskou motorkoutakisto instalovanie linuxovych zaplat prebieha asi tak, ze si nainstalujes novu verziu toho ktoreho programu a nie x megabajtovy patch po ktorom ti dalsich x veci moze prestat fungovat
Vim, ze nikdo nemluvil o dokonalosti, ale ze vsech tech diskuzi, kde se rozhorel flame mezi Widlaky a Linuxaky, jsem z obrannych, ale take utocnych reakci nabyl presvedceni, ze Linuxaci prave tento svuj system povznaseji na uroven neceho "dokonaleho".Ciste muj nazor je, at si kazdej pracuje pod jakym operacnim systemem chce, ale at necpe svoji "ideologii" a hlavne nazory nekomu jinemu. Ten druhy je rad ze je rad a urcite mu prace pod tim jeho operacnim system vyhovuje, protoze kdyby ne, ma prece svobodnou vuli a tak ten doticny muze klidne prejit na jiny operacni system...At si tudis nechaji svuj nazor o "vykonnosti a super bezpecnosti" sveho systemu, pani Linuxaci (ale i Widlaci), pro sebe.
troubo, kdyby MS neco tutlal vubec by jsi se nic nedocetl na Zive... tak jako je tomu prave aktualne v pripade Linuxu...
2Venousekh: Paměti píšu ve vi V linuxu dělám mnoho věcí, ale k tomu mám nainstalováno jen to, co opravdu potřebuju.
nenu dulezite, za jak dlouho vyjde oprava, ale za jak dlouho ji uzivatel nainstaluje...
A co tim chtel basnik rici? To ze vyjde, je snad zakladni predpoklad, aby si ji uzivatel mohl nainstalovat. Vy snad instalujete zaplaty, co nevysly?
ja se zaplatame vubec nezabyvam... viz automaticke Update...
No jo, jenze to si nemuzete dovolit na produkcnim systemu, protoze takova zaplata take muze windows nebo aplikaci na nem bezici zneprovoznit. A v prvni rade jde o ochranu prave techto produkcnich systemu.
Neni to tak davno (par mesicu) co nektere masiny (myslim ze WinXP) nesly po aktualizaci vubec spustit a uzivatele to resili reinstalaci . Proste excelentni
tak o tom nevim nic, ze by fama?
Žádná fáma. Že o tom dotyčný brouk Pytlík neví, neznamená, že to neexistuje. Zapnutí automatických aktualizací si můžou dovolit jen amatéři.
to sme se pobavil... automatickou aktualizaci tu mame zaplou na zhruba deseti pocitacich a na zadnem neni problem... jinak nechapu, proc tuhle funkci nekdo vypina, hrabat se porad nekde na webu a divat se, co se to instaluje, tak na tohle tu nemame cas, koupili sme si produkt, tak at se podpora snazi....
Uvidime az vam po instalaci nektere zaplaty prestane fungovat nejaka pro vasi firmu klicova aplikace. Napr. specializovane vyvojove prostredi, nebo nejaka databaze a vasi zamestanci nebudou moci pul dne pracovat. Co vam na to asi rekne sef, kolik jste usetril casu? Nestalo se to u nas, ale napriklad vim, ze po SP4 pro w2k byly nejake problemy v autocadu. Myslim, ze nesly otevrit drive ulozene projekty.
Asi tak. Na svůj systém záplaty už neistaluju, sice mě to dost mrzí, ale probírat se po reinstalaci systemu vsema zaplatama a zjištovat, která z nich způsobuje, že XP mi zaprznou od 30minut do 1hodiny po po spuštění kompu se mi vážně nechce, i když bych možná měl. Zatím spoléhám na firewall a AVG a programy jine nez napr Outlook expres nebo IE. Zatim mi to vicemene vychazi, ale dockejme casu.
10pc . Ono se to dela trochu jinak (jsou i jine, lepsi nastroje), ale s 10-ti PC vas to nemusi zajimat .
fakt pekne, kolik lidi ma nainstalovanou bugzilu a podobne aplikace, nehlede na to, ze treba o moznosti zneuziti integer overflow v xpdf se da uspesne polemizovat.
Kdyz tak rad kopirujes, tak Ti taky neco pastnu Apr 13 2004 Microsoft ASN.1 Library (msasn1.dll) Double-Free Memory Allocation Error May Let Remote Users Execute Arbitrary CodeApr 13 2004 Microsoft SSL Library PCT Buffer Overflow Lets Remote Users Execute Arbitrary CodeApr 13 2004 Microsoft Help and Support Center Input Validation Flaw Lets Remote Users Execute Arbitrary Code in the My Computer ZoneApr 13 2004 Microsoft LSASS Service Buffer Overflow Lets Remote Users Execute Arbitrary Code With SYSTEM PrivilegesApr 6 2004 Microsoft Windows XP 'mswebdvd.dll' Buffer Overflow Lets Remote Users Deny ServiceMar 24 2004 Microsoft Operating Systems Have Unspecified Flaw That Yields Kernel Level Access to Local UsersFeb 23 2004 Microsoft Windows Explorer Heap Overflow in Processing '.emf' Files Permits Code ExecutionFeb 18 2004 Windows XP Kernel NtSystemDebugControl() Flaws Let Local Users With SeDebugPrivilege Execute Arbitrary Code in Kernel ModeFeb 10 2004 Microsoft Windows Internet Naming Service (WINS) Length Validation Flaw Lets Remote Users Deny ServiceFeb 10 2004 Microsoft ASN.1 Library Heap Overflows Let Remote Users Execute Arbitrary Code With SYSTEM PrivilegesJan 25 2004 Windows XP Explorer Executes Arbitrary Code in FoldersJan 13 2004 Microsoft Windows Buffer Overflow in MDAC Lets Remote Users Execute Arbitrary CodeNov 11 2003 Microsoft Windows Workstation Service (wkssvc.dll) Buffer Overflow Lets Remote Users Execute Arbitrary Code with System PrivilegesOct 15 2003 Microsoft ListBox and ComboBox 'user32.dll' Buffer Overflow May Allow Local Users to Gain Elevated PrivilegesOct 15 2003 Microsoft Help and Support Center HCP Buffer Overflow Lets Remote and Local Users Execute Arbitrary Code With Local Computer PrivilegesOct 15 2003 Microsoft Windows Messenger Service Buffer Overflow Lets Remote Users Execute Arbitrary Code With Local System PrivilegesOct 15 2003 Microsoft Windows Troubleshooter ActiveX Control Buffer Overflow Lets Remote Users Execute Arbitrary CodeOct 15 2003 Microsoft Authenticode Low Memory Flaw May Let Remote Users Execute Arbitrary CodeOct 14 2003 Microsoft Windows RPC Multi-threaded Race Condition Lets Remote Users Crash the ServiceOct 3 2003 Microsoft Windows OS PostThreadMessage() API Permits Local Users to Terminate Processes That Have Message QueuesSep 10 2003 Microsoft Windows Remote Procedure Call (RPC) DCOM Activation Buffer Overflows Let Remote Users Execute Arbitrary CodeSep 3 2003 Microsoft Windows NetBIOS Name Service May Disclose Memory Contents to Remote UsersAug 12 2003 (Vendor Issues Worm Alert) Re: Microsoft Windows Remote Procedure Call (RPC) Service Buffer Overflow in Processing DCOM Requests Allows Remote Code ExecutionJul 25 2003 (Exploit is Available) Re: Microsoft Windows Remote Procedure Call (RPC) Service Buffer Overflow in Processing DCOM Requests Allows Remote Code ExecutionJul 25 2003 (Microsoft Warns Admins to Patch Immediately) Re: Microsoft Windows Remote Procedure Call (RPC) Service Buffer Overflow in Processing DCOM Requests Allows Remote Code ExecutionJul 23 2003 Microsoft Windows NT File Management Flaw May Let Remote Users Crash Certain ApplicationsJul 16 2003 Microsoft Windows XP Shell Buffer Overflow in Processing Folder Display Attributes Permits Remote Code ExecutionJul 16 2003 Microsoft Windows Remote Procedure Call (RPC) Service Buffer Overflow in Processing DCOM Requests Allows Remote Code ExecutionJul 9 2003 Microsoft SMB Buffer Overflow Lets Remote Authenticated Users Execute Arbitrary CodeJul 9 2003 (Microsoft Issues Fix) Microsoft Windows 2000 Accessibility Utility Manager Lets Local Users Gain Elevated PrivilegesJul 9 2003 Microsoft Windows 2000 Accessibility Utility Manager Lets Local Users Gain Elevated PrivilegesJul 3 2003 Microsoft Windows 2000 ShellExecute() Buffer Overflow May Let Users Execute Arbitrary CodeJun 9 2003 Microsoft Windows Server 2003 Drivers May Leak Information From Memory Via Ethernet Packets Containing TCP StreamsMay 21 2003 Microsoft Windows Can Be Crashed By Remote Users via Malformed NetMeeting URLsApr 22 2003 (NTLMv2 Corrects the Flaw) Re: Microsoft NTLM Authentication Protocol Flaw Lets Malicious SMB Servers Gain Access to SystemsApr 20 2003 Microsoft NTLM Authentication Protocol Flaw Lets Malicious SMB Servers Gain Access to SystemsApr 20 2003 Windows XP Service Control Manager Timing Flaw in Service Shutdown May Disclose Sensitive Information to Local UsersApr 18 2003 Microsoft REGEDIT.EXE May Let Local Users Gain Elevated PrivilegesApr 16 2003 Microsoft Windows OS Kernel Messaging Buffer Overflow Lets Local Users Gain Full Control of the SystemApr 15 2003 Microsoft Windows 2003 'win2k.sys' Printing Bug Lets Users Crash the SystemApr 9 2003 Microsoft Windows VM Input Validation Flaw in ByteCode Verifier Lets Malicious Java Applets Execute Arbitrary CodeApr 2 2003 Microsoft Windows Terminal Services RDP Implementation Does Not Validate Server Identity, Allowing Man-in-the-Middle AttacksMar 26 2003 (Microsoft Issues Fix) Microsoft Windows Remote Procedure Call (RPC) Service Null Pointer Dereference Allows Remote Users to Crash the ServiceMar 21 2003 (Other Windows 2000 Applications Are Affected) Re: Microsoft IIS Web Server WebDAV Buffer Overflow Lets Remote Users Execute Arbitrary CodeMar 19 2003 Microsoft Windows Buffer Overflow in Windows Script Engine JScript.DLL Lets Remote Users Execute Arbitrary CodeMar 14 2003 Microsoft Windows 2000/XP PostMessage() API Flaw May Let Local Users Grab Passwords from Local Dialog BoxesFeb 26 2003 Microsoft Windows Me Help and Support Center URL Handler Overflow Lets Remote Users Execute Arbitrary CodeFeb 17 2003 Microsoft Windows 'riched20.DLL' Buffer Overflow May Let Remote Users Crash ApplicationsFeb 5 2003 Microsoft Windows XP Redirector Buffer Overflow May Let Local Users Gain System Level PrivilegesJan 24 2003 Microsoft Windows Terminal Server MSGINA.DLL Flaw Lets Remote Authenticated Users Reboot the ServerJan 22 2003 Microsoft Locator Service Buffer Overflow Lets Remote Users Execute Arbitrary Code with System Level PrivilegesDec 27 2002 Microsoft Windows File Protection Mechanism Weakness in Trusting Code-Signing Certificate Chains Lets Arbitrary Remote Users Sign Code That Will Be Trusted By WindowsDec 26 2002 Microsoft Windows File Protection Weakness May Let Local Users Replace Code With Previous Vulnerable Versions Without DetectionDec 18 2002 Microsoft Windows XP Shell Buffer Overflow in Processing Audio Files Allows Remote Users to Execute Arbitrary CodeDec 12 2002 Microsoft Windows OS Bug in Processing WM_TIMER Messages May Let Local Users Gain Elevated PrivilegesDec 12 2002 (Microsoft Issues Fix for Java VM) Re: Microsoft Internet Explorer Implementation Bugs in Java Native Methods May Let Remote Users Execute Arbitrary Code Via Malicious AppletsDec 12 2002 Microsoft SMB Signing Flaw May Let Remote Users With Access to an SMB Session Gain Control of a Network ClientDec 5 2002 Microsoft Windows XP Wireless LAN Support May Disclose Access Point Information to Remote UsersOct 31 2002 (Microsoft Issues Fix) Microsoft PPTP Service Buffer Overflow May Let Remote Users Execute Arbitrary CodeOct 31 2002 (Microsoft Issues Fix Instructions) Windows 2000 Operating System Default Permissions for the System Partition Lets Local Users Bypass Individual File Permissions and Replace Key System FilesOct 18 2002 Microsoft Windows Remote Procedure Call (RPC) Service Null Pointer Dereference Allows Remote Users to Crash the ServiceOct 17 2002 (Microsoft Issues Fix) Microsoft Windows XP Help and Support Center Hole Lets Remote Users Create URLs That, When Loaded, Will Delete Arbitrary Files on Your SystemOct 3 2002 (Microsoft Issues Fix) Microsoft Windows Help System Buffer Overflow in 'hhctrl.ocx' Lets Remote Users Execute Arbitrary CodeOct 3 2002 Microsoft Windows Help System Bug in Processing Compiled HTML Help Files Lets Remote Users Execute Arbitrary Commands in the Local Computer Security ZoneOct 3 2002 Microsoft Windows Operating System Compressed Folders Allow Arbitrary Files to Be CreatedOct 3 2002 Microsoft Windows Operating System Compressed Folders Allow Arbitrary Code to Be ExecutedOct 2 2002 Microsoft Windows Help System Buffer Overflow in 'hhctrl.ocx' Lets Remote Users Execute Arbitrary CodeSep 26 2002 Microsoft PPTP Service Buffer Overflow May Let Remote Users Execute Arbitrary CodeSep 19 2002 (Microsoft Issues Fix) Microsoft Remote Desktop Protocol (RDP) Design Flaw May Disclose Information About the Unencrypted Data to Remote Users and May Let Data Be Modified During TransmissionSep 19 2002 (Vendor Issues Fix) Microsoft Windows XP Remote Desktop Implementation Bug Lets Remote Users Crash the Operating SystemSep 19 2002 Microsoft NT, 2000, and XP Operating Systems May Execute a 16-bit Application Even When The File Has No Execute PermissionsSep 18 2002 Microsoft Remote Desktop Protocol (RDP) Design Flaw May Disclose Information About the Unencrypted Data to Remote Users and May Let Data Be Modified During TransmissionSep 18 2002 Microsoft Windows XP Remote Desktop Can Be Crashed By Remote Users Sending a Modified RDP PacketSep 11 2002 (Microsoft Issues Windows 2000 Patch) Microsoft Internet Explorer SSL Implementation Flaw in Following Certificate Chains Allows Remote Users to Conduct Man-in-the-Middle Attacks to Obtain Unencrypted Data from the BrowserSep 6 2002 (Microsoft Issues Additional Fixes) Microsoft Internet Explorer SSL Implementation Flaw in Following Certificate Chains Allows Remote Users to Conduct Man-in-the-Middle Attacks to Obtain Unencrypted Data from the BrowserSep 5 2002 (Microsoft Issues Fix) Re: Microsoft Internet Explorer SSL Implementation Flaw in Following Certificate Chains Allows Remote Users to Conduct Man-in-the-Middle Attacks to Obtain Unencrypted Data from the BrowserAug 29 2002 Microsoft Windows Operating System Certificate Enrollment ActiveX Control Allows Remote Users to Delete Certificates on a Target User's SystemAug 22 2002 Microsoft Operating System SMB Protocol Implementation in the NetworkAug 16 2002 Microsoft NTFS Filesystem in Windows NT and Windows 2000 Has Auditing Hole That Lets Local Users Access Files Without the File Access Being AuditedAug 15 2002 Microsoft Network Connection Manager Could Give a Local User System Level PrivilegesAug 15 2002 Microsoft Windows XP Help and Support Center Hole Lets Remote Users Create URLs That, When Loaded, Will Delete Arbitrary Files on Your SystemAug 4 2002 Windows 2000 Operating System Default Permissions for the System Partition Lets Local Users Bypass Individual File Permissions and Replace Key System FilesJun 13 2002 Microsoft Remote Access Service (RAS) Phonebook Buffer Overflow May Let Local Users Execute Arbitrary Code with Local System PrivilegesJun 3 2002 Microsoft Windows Help System Buffer Overflows in 'htctrl.ocx' ActiveX Control May Let Remote Users Execute Arbitrary Code on a Target User's Computer By Sending Malicious HTMLMay 22 2002 Microsoft Windows Debugging Facility for Windows NT4 and 2000 Has Authentication Hole That Lets Local Users Execute Arbitrary Code with SYSTEM PrivilegesApr 19 2002 Microsoft Distributed Transaction Coordinator Can Be Crashed By Remote Users Sending Malformed PacketsApr 17 2002 Microsoft Windows 2000 'microsoft-ds' Service Flaw Allows Remote Users to Create Denial of Service Conditions By Sending Malformed PacketsApr 11 2002 Microsoft Windows 2000 Group Policy Object Enforcement Can Be Circumvented if User License Limits are ExceededApr 5 2002 (Microsoft Issues Fix) Microsoft Windows NT, 2000, and XP Kernel Buffer Overflow in Processing Multiple UNC Provider (MUP) Requests May Let Local Users Obtain System Level PrivilegesApr 5 2002 (Microsoft Issues Fix) Microsoft Windows Operating System File Locking Design May Allow Local Users to Block Group Policy ScriptsApr 4 2002 Microsoft Windows NT, 2000, and XP Kernel Buffer Overflow in Processing Multiple UNC Provider (MUP) Requests May Let Local Users Obtain System Level PrivilegesApr 2 2002 Microsoft Windows 2000 DCOM Implementation Flaw May Disclose Memory Contents to Remote UsersMar 15 2002 Windows NT and 2000 Session Manager Debug Hole Lets Local Users Obtain Handles to Any Process or Thread to Obtain Elevated Privileges on the SystemMar 13 2002 Microsoft Windows 2000 Automatic Log Off Policy Fails to Expire Sessions in ProgressMar 8 2002 Microsoft Windows Operating System Shell URL Handler Bug Lets Remote Users Create HTML That Could Cause Arbitrary Code to Be Executed on Another User's System in Certain SituationsFeb 28 2002 Microsoft Windows 2000 SMTP Service Lets Remote Users Send or Relay Unauthorized Mail (including SPAM) Via the ServerFeb 22 2002 Microsoft XML Core Services in Microsoft Windows XP Operating System Lets Remote Scripts Access and Send Local FilesFeb 19 2002 Microsoft Windows Terminal Services May Cause the System's Screen Saver Lockout Mechanism to Fail in Certain SituationsFeb 19 2002 Windows XP Networking Port May Allow Remote Users to Deny Service By Sending a Stream of TCP SYN PacketsJan 31 2002 Microsoft Windows NT 4.0 and Windows 2000 Domain Controllers May Give Elevated Privileges to Remote Users Who Are Valid Administrators on Other Trusted Domains Jan 28 2002 Windows 2000 TCP Stack Bug Lets Remote Users Cause All Memory to Be Consumed on the ServerJan 21 2002 Microsoft Windows NT/2000 Authentication Lockout Bug May Record Successful Logins as Failed Login Attempts in Certain SituationsJan 21 2002 Microsoft Windows XP Manifest Processing Bug Lets Local Users Corrupt the System and Cause the Boot Process to FailJan 16 2002 Microsoft Windows XP Upgrade Effectively Removes Patches from Internet Explorer (IE) During Upgrade, Leaving Users Exposed to IE VulnerabilitiesJan 5 2002 Microsoft Windows XP Task Manager Will Not Kill Certain ProcessesDec 23 2001 Microsoft Windows XP Remote Desktop Client May Disclose Recently Used Account Names to Remote UsersDec 21 2001 Microsoft C Runtime Format String Flaw Lets Remote Users Crash the Microsoft SQL Server ServiceDec 20 2001 Microsoft Windows Universal Plug and Play Component Buffer Overflow Gives Remote Users System Level Access to Windows XP and 98/ME HostsDec 18 2001 Microsoft Windows XP Hot Key Function Lets Physically Local Users Execute Administrator Hot Key Functions in Certain SituationsDec 14 2001 Microsoft Windows Explorer Discloses Stored FTP Passwords to Local UsersDec 11 2001 (Vendor Cannot Reproduce Claim) Re: Microsoft Windows 2000 RunAs Utility May Disclose Sensitive Information to Local UsersDec 11 2001 (The Vendor Questions The Risk Due to this Vulnerability) Re: Microsoft Windows 2000 RunAs Service May Disclose Authentication Credentials to Local UsersDec 10 2001 (Vendor Confirms) Re: Microsoft Windows 2000 RunAs Service Allows Local Users to Disable the ServiceDec 8 2001 Microsoft Windows Operating System File Locking Design May Allow Local Users to Block Group Policy ScriptsNov 14 2001 Terminal Services on Microsoft Windows 2000 and XP Allow Remote Users to Log Bogus IP Addresses Instead of the User's Genuine AddressNov 13 2001 Microsoft Windows 2000 RunAs Service May Disclose Authentication Credentials to Local UsersNov 13 2001 Microsoft Windows 2000 RunAs Utility May Disclose Sensitive Information to Local UsersNov 13 2001 Microsoft Windows 2000 RunAs Service Allows Local Users to Disable the ServiceOct 23 2001 Macintosh Cients Using Windows 2000 NTFS Volumes May Modify Directory Permissions in Certain CasesOct 19 2001 Microsoft Terminal Servers Can Be Crashed By Remote Users Sending Certain Remote Desktop Protocol (RDP) PacketsAug 22 2001 (Microsoft Issues Fix) Windows 2000 IrDA Infrared Device Driver Lets Infrared Users Crash the SystemAug 22 2001 Windows 2000 IrDA Infrared Device Driver Lets Infrared Users Crash the SystemAug 15 2001 Microsoft Windows TCP/IP Stack Vulnerable to a Certain Man-in-the-Middle Denial of Service AttackAug 1 2001 Microsoft Windows 98 Operating System Can Be Crashed When Running a Web Server or Other Servers And the AUX Device is Accessed By the ProgramJul 28 2001 Microsoft Windows 2000 and Windows NT 4.0 RPC Input Validation Failure Lets Remote Users Destabilize the Operating SystemJul 19 2001 Windows 2000 May Disclose Descriptive Information To Local Users Attempting Password Guessing with the NetUserChangePassword APIJul 13 2001 Microsoft Windows NT Lets Remote Users Cause Increased Packet Overhead and Increased CPU Resource ConsumptionJun 27 2001 (CIAC Issues Advisory L-101) Re: Microsoft Windows 2000 LDAP Server Lets Remote Users Gain Administrator Access to the Domain Controller When Configured to Support LDAP over SSLJun 26 2001 (Official Vendor Bulletin) Re: Microsoft Windows 2000 LDAP Server Lets Remote Users Gain Administrator Access to the Domain Controller When Configured to Support LDAP over SSLJun 26 2001 Microsoft Windows 2000 LDAP Server Lets Remote Users Gain Administrator Access to the Domain Controller When Configured to Support LDAP over SSLMay 24 2001 Microsoft Windows 2000 Allows Local Users to Elevate PrivilegesMay 15 2001 (CIAC Issues Bulletin) Re: Microsoft Windows 2000 Indexing Service Allows Remote Users to View Include Programming FilesMay 15 2001 (CIAC Issues Bulletin) Re: Microsoft Index Server for NT Can Be Crashed By Local Users, Allows Local Users to Execute Arbitrary Code With System Level Privileges, and Lets Remote Users View Certain Include FilesMay 15 2001 (CIAC Issues Bulletin) Re: Microsoft Windows 2000 Domain Controllers Can Be Effectively Halted By Remote UsersMay 11 2001 Microsoft Windows 2000 Indexing Service Allows Remote Users to View Include Programming FilesMay 11 2001 Microsoft Index Server for NT Can Be Crashed By Local Users, Allows Local Users to Execute Arbitrary Code With System Level Privileges, and Lets Remote Users View Certain Include FilesMay 9 2001 (Defcom Labs Advisory) Re: Microsoft Windows 2000 Domain Controllers Can Be Effectively Halted By Remote UsersMay 9 2001 Microsoft Windows 2000 Domain Controllers Can Be Effectively Halted By Remote UsersMar 28 2001 Microsoft Windows Me Operating System and Windows 98 with the Plus! 98 Package Disclose Data Compression PasswordsMar 26 2001 Microsoft's Dr. Watson Diagnostic Utility May Reveal Passwords and Other Sensitive InformationMar 16 2001 A Microsoft German-Language Hotfix for Windows NT 4 Incorrectly Displays Some Security Events as Other Security EventsFeb 16 2001 Windows 2000's WINMM.DLL Can Locally Crash WINLOGIN.EXEJan 15 2001 Internet Explorer, Outlook, and Other HTML-based Applications May Crash Due to Error in MSHTML.DLL HTML Parser
Za rovnake obdobie /od jan. 2003/ je to podstatne menej.
Vsak to jsou take jenom chyby v OS, ne v aplikacich, narozdil od seznamu chyb v Linuxu, ktery je kompletni. Kdyz v seznamu chyb Linuxu muze byt xpdf, proc do chyb MS platformy nezaradit chyby MS Office, nebo treba i aplikaci Adobe, ze?
A chyby v kernelu Windows vynasobit poctem debianich architektur http://www.debian.org/ports/
DSA je zalezitost tykajici se pouze Debian GNU/Linuxu ktery beha na X-architekturach (o kterych se Win-BFU ani nezda). Pro zacatek to zredukujte na bugy tykajici se pouze i386 a vysktrejte serverove sluzby a budeme blize k pravde . Samozrejme ze na vsechny jsou dostupne prislusne patche ve forme balicku, ktere muzete (pokud chcete) instalovat i plne automaticky a to bez restartu, coz se o windows zaplatach rict neda.
profesor, co nás učí UN*X říká. No na počítači přece nemůžete dělat něco důležitého, to by jste si tam nedali wokna. Změnil jsi IP adresu, no tak to se přece musí restartovat. Hmm tuím, že teďka už ne. Nainstaloval jsi aplikaci, restart, uživatel stejně nedělá nic důležitého, až na ten výpočet, co trvá 14 dní.
heh a co takto 2 service pack pre XP???? ved prvy ma cez 100Mb a stale ostava cez 6000 chyb!!!!!!!!!!!!§
a netreba sa cudovat ze po instalacii 2 service packu moze prist nemile prekvapenie
[06 Apr 2004] DSA-478 tcpdump - denial of service[06 Apr 2004] DSA-477 xine-ui - insecure temporary file creation[06 Apr 2004] DSA-476 heimdal - cross-realm[05 Apr 2004] DSA-475 linux-kernel-2.4.18-hppa - several vulnerabilities[03 Apr 2004] DSA-474 squid - ACL bypass[03 Apr 2004] DSA-473 oftpd - denial of service[03 Apr 2004] DSA-472 fte - several vulnerabilities[02 Apr 2004] DSA-471 interchange - missing input sanitising[01 Apr 2004] DSA-470 linux-kernel-2.4.17-hppa - several vulnerabilities[29 Mar 2004] DSA-469 pam-pgsql - missing input sanitising[24 Mar 2004] DSA-468 emil - several vulnerabilities[23 Mar 2004] DSA-467 ecartis - several vulnerabilities[18 Mar 2004] DSA-466 linux-kernel-2.2.10-powerpc-apus - failing function and TLB flush[17 Mar 2004] DSA-465 openssl - several vulnerabilities[16 Mar 2004] DSA-464 gdk-pixbuf - broken image handling[12 Mar 2004] DSA-463 samba - privilege escalation[12 Mar 2004] DSA-462 xitalk - missing privilege release[11 Mar 2004] DSA-461 calife - buffer overflow[10 Mar 2004] DSA-460 sysstat - insecure temporary file[10 Mar 2004] DSA-459 kdelibs - cookie path traversal[09 Mar 2004] DSA-458 python2.2 - buffer overflow[08 Mar 2004] DSA-457 wu-ftpd - several vulnerabilities[06 Mar 2004] DSA-456 linux-kernel-2.2.19-arm - failing function and TLB flush[03 Mar 2004] DSA-455 libxml - buffer overflows[02 Mar 2004] DSA-454 linux-kernel-2.2.22-alpha - failing function and TLB flush[02 Mar 2004] DSA-453 linux-kernel-2.2.20-i386+m68k+powerpc - failing function and TLB flush[29 Feb 2004] DSA-452 libapache-mod-python - denial of service[27 Feb 2004] DSA-451 xboing - buffer overflows[27 Feb 2004] DSA-450 linux-kernel-2.4.19-mips - several vulnerabilities[24 Feb 2004] DSA-449 metamail - buffer overflow, format string bugs[22 Feb 2004] DSA-448 pwlib - several vulnerabilities[22 Feb 2004] DSA-447 hsftp - format string[21 Feb 2004] DSA-446 synaesthesia - insecure file creation[21 Feb 2004] DSA-445 lbreakout2 - buffer overflow[20 Feb 2004] DSA-444 linux-kernel-2.4.17-ia64 - missing function return value check[19 Feb 2004] DSA-443 xfree86 - several vulnerabilities[19 Feb 2004] DSA-442 linux-kernel-2.4.17-s390 - several vulnerabilities[18 Feb 2004] DSA-441 linux-kernel-2.4.17-mips+mipsel - missing function return value check[18 Feb 2004] DSA-440 linux-kernel-2.4.17-powerpc-apus - several vulnerabilities[18 Feb 2004] DSA-439 linux-kernel-2.4.16-arm - several vulnerabilities[18 Feb 2004] DSA-438 linux-kernel-2.4.18-alpha+i386+powerpc - missing function return value check[11 Feb 2004] DSA-437 cgiemail - open mail relay[08 Feb 2004] DSA-436 mailman - several vulnerabilities[06 Feb 2004] DSA-435 mpg123 - heap overflow[05 Feb 2004] DSA-434 gaim - several vulnerabilities[04 Feb 2004] DSA-433 kernel-patch-2.4.17-mips - integer overflow[03 Feb 2004] DSA-432 crawl - buffer overflow[01 Feb 2004] DSA-431 perl - information leak[28 Jan 2004] DSA-430 trr19 - missing privilege release[26 Jan 2004] DSA-429 gnupg - cryptographic weakness[20 Jan 2004] DSA-428 slocate - buffer overflow[19 Jan 2004] DSA-427 linux-kernel-2.4.17-mips+mipsel - missing boundary check[18 Jan 2004] DSA-426 netpbm-free - insecure temporary files[16 Jan 2004] DSA-425 tcpdump - multiple vulnerabilities[16 Jan 2004] DSA-424 mc - buffer overflow[15 Jan 2004] DSA-423 linux-kernel-2.4.17-ia64 - several vulnerabilities[13 Jan 2004] DSA-422 cvs - remote vulnerability[12 Jan 2004] DSA-421 mod-auth-shadow - password expiration[12 Jan 2004] DSA-420 jitterbug - improperly sanitised input[09 Jan 2004] DSA-419 phpgroupware - missing filename sanitising, SQL injection[07 Jan 2004] DSA-418 vbox3 - privilege leak[07 Jan 2004] DSA-417 linux-kernel-2.4.18-powerpc+alpha - missing boundary check[06 Jan 2004] DSA-416 fsp - buffer overflow, directory traversal[06 Jan 2004] DSA-415 zebra - denial of service[06 Jan 2004] DSA-414 jabber - denial of service[06 Jan 2004] DSA-413 linux-kernel-2.4.18 - missing boundary check[05 Jan 2004] DSA-412 nd - buffer overflows[05 Jan 2004] DSA-411 mpg321 - format string vulnerability[05 Jan 2004] DSA-410 libnids - buffer overflow[05 Jan 2004] DSA-409 bind - denial of service[05 Jan 2004] DSA-408 screen - integer overflow[05 Jan 2004] DSA-407 ethereal - buffer overflows[05 Jan 2004] DSA-406 lftp - buffer overflow
[06.04.2004] DSA-478 tcpdump - denial of service[06.04.2004] DSA-477 xine-ui - insecure temporary file creation[06.04.2004] DSA-476 heimdal - cross-realm[05.04.2004] DSA-475 linux-kernel-2.4.18-hppa - several vulnerabilities[03.04.2004] DSA-474 squid - ACL bypass[03.04.2004] DSA-473 oftpd - denial of service[03.04.2004] DSA-472 fte - several vulnerabilities[02.04.2004] DSA-471 interchange - missing input sanitising[01.04.2004] DSA-470 linux-kernel-2.4.17-hppa - several vulnerabilities[29.03.2004] DSA-469 pam-pgsql - missing input sanitising
Hmmm...To jsou vesmes veci, ktere prumerny uzivatel vubec nainstalovany nema Proste to neokecate...Bezpecnost Windows je o dost horsi.
Opravdu linux-kernel vetsina uyivatelu nainstalovano nema ))))))))))))))))))))))))
Mel byste absolvovat nejaky kurs logiky. To, ze vetsinu veci z toho uzivatele nemaji neznamena, ze nekterou z danych veci nema nainstalovanu vetsina uzivatelu. Mimochodem si vsimnete, ze ty dve chyby v kernelu se tykaji kazda jine verze, takze prumerneho uzivatele bude trapit nejvysse jedna z nich. Nebo taky zadna.
linux-kernel pro PA-RISC skutecne vetsina uzivatelu nainstalovany nema
To se pak nemůžou divit, možná by se měli na chvilku zastavit a jeden z těch systémů udělat pořádně, myslím, že zákazníci by jim pak klidně na novou verzi počkali i 5let.
Keby len to... ale aj pocet clankov na zive.cz by klesol, tym padom aj honorare autorov a to by bol pruser (po slovensky priekak). Este ze mame MS, aj business frci, aj novinari maju o com pisat...
Aj linuxisti majú o čom pindať...
a Kahovec jim tise v koutku zavidet ;))
Nemalo by to po slovensky byť prieser?
Potvrďte prosím přezdívku, kterou jsme náhodně vygenerovali, nebo si zvolte jinou. Zajistí, že váš profil bude unikátní.
Tato přezdívka je už obsazená, zvolte prosím jinou.