Debian: 2196-1: maradns: buffer overflow


 
Thread Tools Search this Thread
Special Forums Cybersecurity Security Advisories (RSS) Debian: 2196-1: maradns: buffer overflow
# 1  
Old 03-21-2011
Debian: 2196-1: maradns: buffer overflow

LinuxSecurity.com: Witold Baryluk discovered that MaraDNS, a simple security-focused Domain Name Service server, may overflow an internal buffer when handling requests with a large number of labels, causing a server crash and the consequent denial of service. [More...]

More...
This User Gave Thanks to Linux Bot For This Post:
Login or Register to Ask a Question

Previous Thread | Next Thread
Login or Register to Ask a Question
userdbget(1M)															     userdbget(1M)

NAME
userdbget - display information residing in the user database, /var/adm/userdb SYNOPSIS
name [attr]... [attr]... DESCRIPTION
displays the per-user information residing in the user database as a sequence of pairs. Each pair is printed on a separate line and is preceded by the username. A per-user value in the user database, overrides any system-wide default configured in See userdb(4) and secu- rity(4) for more details about the user database and system-wide defaults, respectively. If no attr arguments are specified on the command line, displays all configurable attributes of users in the user database. If one or more attr arguments are specified, displays only those attributes. Options The following options are recognized: Display attributes of all users in the user database. Display internal attributes, in addition to the configurable ones. Internal attributes are not user configurable and are normally modified only by programs that enforce system security. The file indicates which attributes are configurable and which are internal. Display attributes for only the specified user name. Notes Only users who have read and write access to can run RETURN VALUE
exits with one of the following values: success invalid user invalid usage insufficient permission to access the user database file system error invalid attribute; does not allow a per-user value an attribute value is not within the range specified in block overflow entry overflow database lock failure database is disabled; see userdb(4) invalid user name not a local user EXAMPLES
In the following example, all attributes for user are printed. The audit flag for user is enabled. The display last login feature is dis- abled. In the next example, only specific attributes are printed. The audit flag for user is enabled. No value is printed for because that attribute is not defined for user the minimum password length for user is the system-wide default defined in (see security(4)). In the last example, prints all configurable attributes of all users in the user database. FILES
user database security defaults configuration file security attributes description file SEE ALSO
userdbck(1M), userdbset(1M), userdb_read(3), security(4), userdb(4). userdbget(1M)