S-368: RealNetworks Vulnerabilities


 
Thread Tools Search this Thread
Special Forums Cybersecurity Security Advisories (RSS) S-368: RealNetworks Vulnerabilities
# 1  
Old 08-20-2008
S-368: RealNetworks Vulnerabilities

RealPlayer contains a buffer overflow vulnerability that may allow an attacker to execute code on a vulnerable system. The risk is MEDIUM. BY convincing a user to visit a website, a remote attacker may be able to execute arbitrary code.


More...
Login or Register to Ask a Question

Previous Thread | Next Thread

2 More Discussions You Might Find Interesting

1. Red Hat

Openssl vulnerabilities

Hi there, The following openssl package are installed on the machine (openssl-1.0.0-27.el6_4.2.x86_64). It isn't the last version but I need to known if this content Vulnerabilities... How to check that on RedHat? Could you please tell me how to find this information?? Thankx (3 Replies)
Discussion started by: hiero_nymus
3 Replies

2. Solaris

What are the NTP 3 vulnerabilities?

Hi Guru I need to know which version of NTP is install in Solaris 10 box. How can I check it. IF NTP 3 in implemented then somebody told me implement NTP 4 due to security reasons, for that I have to tell what are the vulnerabilities present in NTP 3 to higher authorities. I could not able... (5 Replies)
Discussion started by: amity
5 Replies
Login or Register to Ask a Question
TOMOYO-SAVEPOLICY(8)					  System Administration Utilities				      TOMOYO-SAVEPOLICY(8)

NAME
tomoyo-savepolicy - save TOMOYO Linux policy SYNOPSIS
tomoyo-savepolicy [directory] tomoyo-savepolicy [directory] [remote_ip:remote:port] DESCRIPTION
This program saves TOMOYO Linux policy onto disk from kernel memory. The directory /etc/tomoyo/policy/YY-MM-DD.hh:mm:ss is created with four files inside: domain_policy.conf, exception_policy.conf, profile.conf, and manager.conf. The symbolic links /etc/tomoyo/policy/previous and /etc/tomoyo/policy/current are updated to point to the previous and current YY-MM-DD.hh:mm:ss directories respectively. The following symbolic links should exist within the /etc/tomoyo directory: domain_policy.conf -> policy/current/domain_policy.conf exception_policy.conf -> policy/current/exception_policy.conf profile.conf -> policy/current/profile.conf manager.conf -> policy/current/manager.conf policy/current -> policy/YY-MM-DD.hh:mm:ss policy/previous -> policy/YY-MM-DD.hh:mm:ss You can therefore access the current policy files without having to descend into subdirectories, and without having to determine which YY-MM-DD.hh:mm:ss directory is the most recent. If the policy type is specified, this program works similar to cat(1). OPTIONS
-e Print /sys/kernel/security/tomoyo/exception_policy to standard output. -d Print /sys/kernel/security/tomoyo/domain_policy to standard output. -p Print /sys/kernel/security/tomoyo/profile to standard output. -m Print /sys/kernel/security/tomoyo/manager to standard output. -s Print /sys/kernel/security/tomoyo/stat to standard output. directory Save policy to an alternative directory, rather than the default /etc/tomoyo directory. remote_ip:remote_port Save policy on a remote system via an agent waiting at port remote_port on IP address remote_ip. EXAMPLES
Save policy to disk tomoyo-savepolicy Print "/sys/kernel/security/tomoyo/exception_policy" to standard output tomoyo-savepolicy -e Retrieve policy from a remote system and save in a local directory tomoyo-savepolicy /etc/tomoyo/192.168.1.1/ 192.168.1.1:10000 BUGS
If you find any bugs, send an email to <tomoyo-users-en@lists.sourceforge.jp>. AUTHORS
Tetsuo Handa <penguin-kernel@I-love.SAKURA.ne.jp> Main author. Jamie Nguyen <jamie@tomoyolinux.co.uk> Documentation and website. SEE ALSO
tomoyo-editpolicy-agent(8), tomoyo-loadpolicy(8) See <http://tomoyo.sourceforge.jp> for more information. tomoyo-tools 2.5.0 2012-04-14 TOMOYO-SAVEPOLICY(8)