S-368: RealNetworks Vulnerabilities


 
Thread Tools Search this Thread
Special Forums Cybersecurity Security Advisories (RSS) S-368: RealNetworks Vulnerabilities
# 1  
Old 08-20-2008
S-368: RealNetworks Vulnerabilities

RealPlayer contains a buffer overflow vulnerability that may allow an attacker to execute code on a vulnerable system. The risk is MEDIUM. BY convincing a user to visit a website, a remote attacker may be able to execute arbitrary code.


More...
Login or Register to Ask a Question

Previous Thread | Next Thread

2 More Discussions You Might Find Interesting

1. Red Hat

Openssl vulnerabilities

Hi there, The following openssl package are installed on the machine (openssl-1.0.0-27.el6_4.2.x86_64). It isn't the last version but I need to known if this content Vulnerabilities... How to check that on RedHat? Could you please tell me how to find this information?? Thankx (3 Replies)
Discussion started by: hiero_nymus
3 Replies

2. Solaris

What are the NTP 3 vulnerabilities?

Hi Guru I need to know which version of NTP is install in Solaris 10 box. How can I check it. IF NTP 3 in implemented then somebody told me implement NTP 4 due to security reasons, for that I have to tell what are the vulnerabilities present in NTP 3 to higher authorities. I could not able... (5 Replies)
Discussion started by: amity
5 Replies
Login or Register to Ask a Question
PWMAKE(1)						      General Commands Manual							 PWMAKE(1)

NAME
pwmake - simple tool for generating random relatively easily pronounceable passwords SYNOPSIS
pwmake <entropy-bits> DESCRIPTION
pwmake is a simple configurable tool for generating random and relatively easily pronounceable passwords. The tool allows you to specify the number of entropy bits that are used to generate the password. The entropy is pulled from /dev/urandom. The minimum number of bits is 56 which is usable for passwords on systems/services where brute force attacks are of very limited rate of tries. The 64 bits should be adequate for applications where the attacker does not have direct access to the password hash file. For situ- ations where the attacker might obtain the direct access to the password hash or the password is used as an encryption key 80 to 128 bits should be used depending on your level of paranoia. OPTIONS
The first and only argument is the number of bits of entropy used to generate the password. FILES
/etc/security/pwquality.conf - The configuration file for the libpwquality library. RETURN CODES
pwmake returns 0 on success, non zero on error. SEE ALSO
pwscore(1), pam_pwquality(8) AUTHORS
Tomas Mraz <tmraz@redhat.com> Red Hat, Inc. 10 Nov 2011 PWMAKE(1)