S-087: centericq Vulnerability


 
Thread Tools Search this Thread
Special Forums Cybersecurity Security Advisories (RSS) S-087: centericq Vulnerability
# 1  
Old 12-24-2007
S-087: centericq Vulnerability

Several remote vulnerabilities have been discovered in centericq, a text-mode multi-protocol instant messanger client, which could allow remote attackers to execute arbitrary code due to insufficient bounds-testing. The risk is MEDIUM. Could allow remote attackers to execute arbitrary code due to insufficient bounds-testing.


More...
Login or Register to Ask a Question

Previous Thread | Next Thread

4 More Discussions You Might Find Interesting

1. IP Networking

Common Vulnerability

Hi there, I am trying to find info about the commonly used ports and how it can be vulnerable and to identify them? For example, I would like to identify how to man-in-the-middle using these ports 21(FTP),22(SSH),23(TELNET), (1 Reply)
Discussion started by: alvinoo
1 Replies

2. News, Links, Events and Announcements

Bash vulnerability

Not sure if there is a post about it here somewhere already. Anyway: Remote exploit vulnerability in bash CVE-2014-6271 | CSO Online (3 Replies)
Discussion started by: zaxxon
3 Replies

3. UNIX for Dummies Questions & Answers

Vulnerability Alerts

Aside from CERT, are there any additional sources for unix/linux vulnerabilities? (1 Reply)
Discussion started by: kmgrady01
1 Replies

4. Cybersecurity

SNMP Vulnerability

SNMP Vulnerability: In a few minutes wire services and other news sources will begin breaking a story about widespread vulnerabilities in SNMP (Simple Network Management Protocol). Exploits of the vulnerability cause systems to fail or to be taken over. The vulnerability can be found in... (1 Reply)
Discussion started by: dpatel
1 Replies
Login or Register to Ask a Question
prestoctl_svc(8)					      System Manager's Manual						  prestoctl_svc(8)

Name
       prestoctl_svc - Prestoserve control daemon

Syntax
       /usr/etc/prestoctl_svc [ -n ]

Description
       The RPC-based daemon allows remote client systems to monitor and administer a Prestoserve cache and its driver.	The client system does not
       have to be running the Prestoserve software.  The daemon can be started manually, or it can be started each time you reboot by  adding  the
       command to the file of the machine running the Prestoserve software.

       You  must  run the daemon if you want remote client systems to be able to use the command to monitor and manage your system and if you want
       to use the command.  Refer to and to for more information.

Options
       -n     Allows remote client systems to manage a Prestoserve cache and its driver.  The -n option allows remote client systems to change the
	      size of a Prestoserve cache and to change the state of a Prestoserve cache by using remote procedure calls.  The -n option is useful
	      when evaluating or demonstrating Prestoserve capabilities.  Because of security problems, it is recommended that the -n  option  not
	      be used on production machines.

Files
       Generic Prestoserve control device.

       File where you add the
			 command.

See Also
       presto(8), dxpresto(8X), presto(4)
       Guide to Prestoserve

																  prestoctl_svc(8)