Blogs

Thawte no longer offering Free Personal E-mail Certificates and is closing the Web of Trust

https://search.thawte.com/support/ssl-digital-certificates/index?page=co...

It appears that Thawte is closing down the Free Personal E-mail
Certificate program it has been offering over the years due to budgetary
concerns.

Any certificates offered under the Thawte program will expire on 16
November 2009. Current users will be offered a free, 1 year
subscription for a Verisign certificate. The current price is $19.95/year.

TCP State Manipulation Denial of Service Vulnerabilities in Multiple Cisco Products

http://www.cisco.com/warp/public/707/cisco-sa-20090908-tcp24.shtml

Related to CVE-2008-4609 (SA1180), Cisco has reported on which versions
of their Software is vulnerable to this TCP State Manipulation DoS.

This vulnerability could lead to resource exhaustion on Cisco products,
requiring them to be rebooted in order to continue service. These
products are affected.

TCP State Manipulation Denial of Service Vulnerabilities in Multiple Cisco Products

http://www.cisco.com/warp/public/707/cisco-sa-20090908-tcp24.shtml

Related to CVE-2008-4609 (SA1180), Cisco has reported on which versions
of their Software is vulnerable to this TCP State Manipulation DoS.

This vulnerability could lead to resource exhaustion on Cisco products,
requiring them to be rebooted in order to continue service. These
products are affected.

Microsoft Windows & Nortel TCP/IP TimeStamps Remote Code Execution Vulnerability

http://www.securityfocus.com/bid/36265/info

"Microsoft Windows TCP/IP protocol implementation is prone to a remote
code-execution vulnerability.

An attacker can exploit this issue to execute arbitrary code with
SYSTEM-level privileges. Successful attacks will completely compromise
affected computers."

An exploit has been successfully implemented in a commercial application.

Microsoft Windows & Nortel TCP/IP TimeStamps Remote Code Execution Vulnerability

http://www.securityfocus.com/bid/36265/info

"Microsoft Windows TCP/IP protocol implementation is prone to a remote
code-execution vulnerability.

An attacker can exploit this issue to execute arbitrary code with
SYSTEM-level privileges. Successful attacks will completely compromise
affected computers."

An exploit has been successfully implemented in a commercial application.

Ubuntu, Kubuntu, Edubuntu, and Xubuntu PAM vulnerability could lead to remote, unauthorized access

http://seclists.org/fulldisclosure/2009/Sep/0046.html

A non-default configuration of Pam under Ubuntu 8.10 and Ubuntu 9.04
could lead to successful authentication of unauthorized users to an
Ubuntu machine.

"The problem can be corrected by upgrading your system to the following
package versions:

Ubuntu 8.10:

libpam-runtime 1.0.1-4ubuntu5.6

Ubuntu 9.04:

libpam-runtime 1.0.1-9ubuntu1.1"

Pages