«
Expand/Collapse
31 items tagged "x server"
Related tags:
memory corruption [+],
mac os x server [+],
mac os x [+],
linux [+],
gentoo linux security [+],
gentoo [+],
vulnerability [+],
record [+],
local privilege escalation [+],
arbitrary code execution [+],
apple mac os [+],
x imageio [+],
tiff [+],
technical [+],
security advisory [+],
overflow [+],
ngs [+],
local [+],
integer [+],
idefense security advisory [+],
hotkey [+],
formula [+],
extension [+],
dominic chell [+],
denial of service [+],
cyber security alert [+],
cyber [+],
x image [+],
shm [+],
server [+],
security extension [+],
secunia [+],
raw [+],
privilege escalation vulnerability [+],
paul harrington [+],
multiple buffer overflow [+],
multiple [+],
module [+],
mit shm [+],
information disclosure vulnerability [+],
information [+],
heap memory [+],
buffer [+],
advisory [+],
xinput [+],
wrapper [+],
server x [+],
server settings [+],
security restrictions [+],
s system [+],
render [+],
quot [+],
privilege [+],
pcf [+],
parser [+],
nvidia [+],
nginx [+],
mod [+],
malicious users [+],
m gs [+],
local security [+],
graphics card [+],
font [+],
engine [+],
command [+],
buffer overflow vulnerability [+],
apple os x [+],
apple os [+],
anyone [+],
Wireless [+],
x.org [+],
security [+],
mac os [+]
-
-
23:41
»
Packet Storm Security Advisories
Secunia Security Advisory - Some vulnerabilities have been reported in Apple OS X Server, which can be exploited by malicious people to disclose certain sensitive information, bypass certain security restrictions, and compromise a user's system.
-
-
17:00
»
SecuriTeam
X.Org X Server is prone to multiple heap-based memory-corruption vulnerabilities because the application fails to sufficiently sanitize user-supplied input.
-
-
6:48
»
Packet Storm Security Advisories
Gentoo Linux Security Advisory 201207-4 - A format string vulnerability in X.Org X Server may allow local privilege escalation or Denial of Service. Versions less than 1.11.4-r1 are affected.
-
6:48
»
Packet Storm Security Recent Files
Gentoo Linux Security Advisory 201207-4 - A format string vulnerability in X.Org X Server may allow local privilege escalation or Denial of Service. Versions less than 1.11.4-r1 are affected.
-
6:48
»
Packet Storm Security Misc. Files
Gentoo Linux Security Advisory 201207-4 - A format string vulnerability in X.Org X Server may allow local privilege escalation or Denial of Service. Versions less than 1.11.4-r1 are affected.
-
-
15:35
»
Packet Storm Security Advisories
Gentoo Linux Security Advisory 201201-16 - A debugging functionality in the X.Org X Server that is bound to a hotkey by default can be used by local attackers to circumvent screen locking utilities. Versions less than 2.4.1-r3 are affected.
-
15:35
»
Packet Storm Security Recent Files
Gentoo Linux Security Advisory 201201-16 - A debugging functionality in the X.Org X Server that is bound to a hotkey by default can be used by local attackers to circumvent screen locking utilities. Versions less than 2.4.1-r3 are affected.
-
15:35
»
Packet Storm Security Misc. Files
Gentoo Linux Security Advisory 201201-16 - A debugging functionality in the X.Org X Server that is bound to a hotkey by default can be used by local attackers to circumvent screen locking utilities. Versions less than 2.4.1-r3 are affected.
-
-
22:50
»
Packet Storm Security Advisories
Technical Cyber Security Alert 2011-286A - There are multiple vulnerabilities in Mac OS X 10.6.8, 10.7, and 10.7.1 and Mac OS X Server 10.6.8, 10.7, and 10.7.1. Apple has released updates to address these vulnerabilities.
-
22:50
»
Packet Storm Security Recent Files
Technical Cyber Security Alert 2011-286A - There are multiple vulnerabilities in Mac OS X 10.6.8, 10.7, and 10.7.1 and Mac OS X Server 10.6.8, 10.7, and 10.7.1. Apple has released updates to address these vulnerabilities.
-
22:50
»
Packet Storm Security Misc. Files
Technical Cyber Security Alert 2011-286A - There are multiple vulnerabilities in Mac OS X 10.6.8, 10.7, and 10.7.1 and Mac OS X Server 10.6.8, 10.7, and 10.7.1. Apple has released updates to address these vulnerabilities.
-
-
14:24
»
Packet Storm Security Advisories
Paul Harrington of NGS Secure has discovered a high risk vulnerability in Mac OS X Image RAW. Multiple buffer overflow issues existed in Image RAW's handling of Canon RAW images. Viewing a maliciously crafted Canon RAW image may result in an unexpected application termination or arbitrary code execution. Versions affected include Mac OS X 10.6 through 10.6.6, Mac OS X Server 10.6 through 10.6.6 with RawCamera.bundle versions prior to 3.6.
-
14:24
»
Packet Storm Security Recent Files
Paul Harrington of NGS Secure has discovered a high risk vulnerability in Mac OS X Image RAW. Multiple buffer overflow issues existed in Image RAW's handling of Canon RAW images. Viewing a maliciously crafted Canon RAW image may result in an unexpected application termination or arbitrary code execution. Versions affected include Mac OS X 10.6 through 10.6.6, Mac OS X Server 10.6 through 10.6.6 with RawCamera.bundle versions prior to 3.6.
-
13:35
»
Packet Storm Security Advisories
Dominic Chell of NGS Secure has discovered a High risk vulnerability in Mac OS X ImageIO. An integer overflow issue exists in ImageIO's handling of JPEG-encoded TIFF images. Viewing a maliciously crafted TIFF image may result in an unexpected application termination or arbitrary code execution. Versions affected include Mac OS X 10.6 through 10.6.6, Mac OS X Server 10.6 through 10.6.6.
-
13:35
»
Packet Storm Security Recent Files
Dominic Chell of NGS Secure has discovered a High risk vulnerability in Mac OS X ImageIO. An integer overflow issue exists in ImageIO's handling of JPEG-encoded TIFF images. Viewing a maliciously crafted TIFF image may result in an unexpected application termination or arbitrary code execution. Versions affected include Mac OS X 10.6 through 10.6.6, Mac OS X Server 10.6 through 10.6.6.
-
13:35
»
Packet Storm Security Misc. Files
Dominic Chell of NGS Secure has discovered a High risk vulnerability in Mac OS X ImageIO. An integer overflow issue exists in ImageIO's handling of JPEG-encoded TIFF images. Viewing a maliciously crafted TIFF image may result in an unexpected application termination or arbitrary code execution. Versions affected include Mac OS X 10.6 through 10.6.6, Mac OS X Server 10.6 through 10.6.6.
-
13:32
»
Packet Storm Security Advisories
iDefense Security Advisory 03.21.11 -Remote exploitation of a memory corruption vulnerability in Apple Inc.'s OfficeImport framework could allow an attacker to execute arbitrary code with the privileges of the current user. The vulnerability occurs when parsing an Excel file with a certain maliciously constructed record. This record is used to describe a formula that is shared between multiple cells. In this record, the 'formula' field is used to specify the formula used. By corrupting certain opcodes within this formula it is possible to trigger a memory corruption vulnerability. This can lead to the execution of arbitrary code. Apple has reported Mac OS X and OS X Server 10.6 through 10.6.6 vulnerable.
-
13:32
»
Packet Storm Security Recent Files
iDefense Security Advisory 03.21.11 -Remote exploitation of a memory corruption vulnerability in Apple Inc.'s OfficeImport framework could allow an attacker to execute arbitrary code with the privileges of the current user. The vulnerability occurs when parsing an Excel file with a certain maliciously constructed record. This record is used to describe a formula that is shared between multiple cells. In this record, the 'formula' field is used to specify the formula used. By corrupting certain opcodes within this formula it is possible to trigger a memory corruption vulnerability. This can lead to the execution of arbitrary code. Apple has reported Mac OS X and OS X Server 10.6 through 10.6.6 vulnerable.
-
13:32
»
Packet Storm Security Misc. Files
iDefense Security Advisory 03.21.11 -Remote exploitation of a memory corruption vulnerability in Apple Inc.'s OfficeImport framework could allow an attacker to execute arbitrary code with the privileges of the current user. The vulnerability occurs when parsing an Excel file with a certain maliciously constructed record. This record is used to describe a formula that is shared between multiple cells. In this record, the 'formula' field is used to specify the formula used. By corrupting certain opcodes within this formula it is possible to trigger a memory corruption vulnerability. This can lead to the execution of arbitrary code. Apple has reported Mac OS X and OS X Server 10.6 through 10.6.6 vulnerable.
-
-
4:19
»
Packet Storm Security Advisories
Secunia Security Advisory - A security issue has been reported in Mac OS X Server, which can be exploited by malicious users to gain knowledge of sensitive information.
-
-
0:35
»
remote-exploit & backtrack
I was wondering if anyone on here has been successful in overclocking this particular graphics card. I added the "coolbit" option and I even see the overclock options in the Nvidia X Server Settings, but when I try to change any of the values, it changes right back to default values. Really weird. If anyone has been successful, would you please share what you did and also what values you used? Thanks!