No signature database was found. This likely indicates that a complete No signature database was found. This likely indicates that a complete No signature database was found. This likely indicates that a complete No signature database was found. This likely indicates that a complete No signature database was found. This likely indicates that a complete No signature database was found. This likely indicates that a complete
It may also indicate an incorrect configuration of the security checking
Code [sig001e]
Code [sig001e]
system.
It may also indicate an incorrect configuration of the security checking
Code [sig001e]
Code [sig001e]
Code [sig001e]
It may also indicate an incorrect configuration of the security checking
Code [sig001e]
Code [sig001e]
Code [sig001e]
system.
It may also indicate an incorrect configuration of the security checking
It may also indicate an incorrect configuration of the security checking
Code [sig001e]
It may also indicate an incorrect configuration of the security checking
Code [sig001e]
It may also indicate an incorrect configuration of the security checking
It may also indicate an incorrect configuration of the security checking
It may also indicate an incorrect configuration of the security checking
Code [sig001e]
It may also indicate an incorrect configuration of the security checking
It may also indicate an incorrect configuration of the security checking
It may also indicate an incorrect configuration of the security checking
It may also indicate an incorrect configuration of the security checking
Code [sig001e]
Code [sig001e]
system.
Code [sig001e]
No signature database was found. This likely indicates that a complete
system.
Because the signature database does not exist, it will not be possible
No signature database was found. This likely indicates that a complete
system.
Code [sig001e]
system.
No signature database was found. This likely indicates that a complete
No signature database was found. This likely indicates that a complete
Code [sig001e]
No signature database was found. This likely indicates that a complete
No signature database was found. This likely indicates that a complete
system.
No signature database was found. This likely indicates that a complete
No signature database was found. This likely indicates that a complete
system.
system.
Code [sig001e]
No signature database was found. This likely indicates that a complete
Code [sig001e]
system.
No signature database was found. This likely indicates that a complete
system.
system.
system.
system.
No signature database was found. This likely indicates that a complete
system.
system.
No signature database was found. This likely indicates that a complete
No signature database was found. This likely indicates that a complete
No signature database was found. This likely indicates that a complete
port of the security checking system has not been done for this system.
Because the signature database does not exist, it will not be possible
to perform the checks for altered binaries and installed security
port of the security checking system has not been done for this system.
port of the security checking system has not been done for this system.
No signature database was found. This likely indicates that a complete
port of the security checking system has not been done for this system.
Because the signature database does not exist, it will not be possible
port of the security checking system has not been done for this system.
No signature database was found. This likely indicates that a complete
port of the security checking system has not been done for this system.
port of the security checking system has not been done for this system.
port of the security checking system has not been done for this system.
No signature database was found. This likely indicates that a complete
port of the security checking system has not been done for this system.
No signature database was found. This likely indicates that a complete
port of the security checking system has not been done for this system.
port of the security checking system has not been done for this system.
port of the security checking system has not been done for this system.
port of the security checking system has not been done for this system.
Because the signature database does not exist, it will not be possible
It may also indicate an incorrect configuration of the security checking
port of the security checking system has not been done for this system.
to perform the checks for altered binaries and installed security
Because the signature database does not exist, it will not be possible
patches.
Because the signature database does not exist, it will not be possible
It may also indicate an incorrect configuration of the security checking
It may also indicate an incorrect configuration of the security checking
Because the signature database does not exist, it will not be possible
port of the security checking system has not been done for this system.
port of the security checking system has not been done for this system.
It may also indicate an incorrect configuration of the security checking
It may also indicate an incorrect configuration of the security checking
to perform the checks for altered binaries and installed security
It may also indicate an incorrect configuration of the security checking
Because the signature database does not exist, it will not be possible
Because the signature database does not exist, it will not be possible
It may also indicate an incorrect configuration of the security checking
Because the signature database does not exist, it will not be possible
It may also indicate an incorrect configuration of the security checking
port of the security checking system has not been done for this system.
It may also indicate an incorrect configuration of the security checking
port of the security checking system has not been done for this system.
Because the signature database does not exist, it will not be possible
Because the signature database does not exist, it will not be possible
It may also indicate an incorrect configuration of the security checking
Because the signature database does not exist, it will not be possible
It may also indicate an incorrect configuration of the security checking
Because the signature database does not exist, it will not be possible
Because the signature database does not exist, it will not be possible
Because the signature database does not exist, it will not be possible
Because the signature database does not exist, it will not be possible
It may also indicate an incorrect configuration of the security checking
It may also indicate an incorrect configuration of the security checking
to perform the checks for altered binaries and installed security
It may also indicate an incorrect configuration of the security checking
system.
patches.
Code [sig002a]
patches.
patches.
system.
system.
patches.
patches.
system.
system.
patches.
patches.
patches.
patches.
patches.
patches.
Code [sig002a]
patches.
Because the signature database does not exist, it will not be possible
Code [sig002a]
Because the signature database does not exist, it will not be possible
Because the signature database does not exist, it will not be possible
Because the signature database does not exist, it will not be possible
Because the signature database does not exist, it will not be possible
Code [sig002a]
Because the signature database does not exist, it will not be possible
Code [sig002a]
The signature for the indicated file matches a signature obtained
to perform the checks for altered binaries and installed security
Code [sig002a]
from a binary known to have been altered. This indicates that the
to perform the checks for altered binaries and installed security
to perform the checks for altered binaries and installed security
to perform the checks for altered binaries and installed security
The signature for the indicated file matches a signature obtained
to perform the checks for altered binaries and installed security
Code [sig002a]
Because the signature database does not exist, it will not be possible
to perform the checks for altered binaries and installed security
Code [sig002a]
Because the signature database does not exist, it will not be possible
Code [sig002a]
Code [sig002a]
to perform the checks for altered binaries and installed security
to perform the checks for altered binaries and installed security
Because the signature database does not exist, it will not be possible
to perform the checks for altered binaries and installed security
Code [sig002a]
Code [sig002a]
Code [sig002a]
Code [sig002a]
Code [sig002a]
to perform the checks for altered binaries and installed security
Because the signature database does not exist, it will not be possible
to perform the checks for altered binaries and installed security
Code [sig002a]
Code [sig002a]
to perform the checks for altered binaries and installed security
The signature for the indicated file matches a signature obtained
to perform the checks for altered binaries and installed security
to perform the checks for altered binaries and installed security
patches.
The signature for the indicated file matches a signature obtained
from a binary known to have been altered. This indicates that the
system has been compromised. The system should be checked for other
patches.
patches.
The signature for the indicated file matches a signature obtained
patches.
The signature for the indicated file matches a signature obtained
to perform the checks for altered binaries and installed security
patches.
from a binary known to have been altered. This indicates that the
patches.
The signature for the indicated file matches a signature obtained
The signature for the indicated file matches a signature obtained
patches.
to perform the checks for altered binaries and installed security
The signature for the indicated file matches a signature obtained
patches.
patches.
to perform the checks for altered binaries and installed security
The signature for the indicated file matches a signature obtained
The signature for the indicated file matches a signature obtained
The signature for the indicated file matches a signature obtained
The signature for the indicated file matches a signature obtained
The signature for the indicated file matches a signature obtained
patches.
The signature for the indicated file matches a signature obtained
to perform the checks for altered binaries and installed security
patches.
The signature for the indicated file matches a signature obtained
patches.
patches.
from a binary known to have been altered. This indicates that the
from a binary known to have been altered. This indicates that the
patches.
Code [sig002a]
Code [sig002a]
Code [sig002a]
Code [sig002a]
system has been compromised. The system should be checked for other
signs of intrusion and cleaned up. The indicated binary should be
Code [sig002a]
system has been compromised. The system should be checked for other
Code [sig002a]
Code [sig002a]
system has been compromised. The system should be checked for other
Code [sig002a]
signs of intrusion and cleaned up. The indicated binary should be
Code [sig002a]
system has been compromised. The system should be checked for other
Code [sig002a]
Code [sig002a]
Code [sig002a]
Code [sig002a]
system has been compromised. The system should be checked for other
system has been compromised. The system should be checked for other
The signature for the indicated file matches a signature obtained
The signature for the indicated file matches a signature obtained
signs of intrusion and cleaned up. The indicated binary should be
system has been compromised. The system should be checked for other
Code [sig002a]
Code [sig002a]
The signature for the indicated file matches a signature obtained
Code [sig002a]
signs of intrusion and cleaned up. The indicated binary should be
The signature for the indicated file matches a signature obtained
signs of intrusion and cleaned up. The indicated binary should be
The signature for the indicated file matches a signature obtained
signs of intrusion and cleaned up. The indicated binary should be
signs of intrusion and cleaned up. The indicated binary should be
replaced from distribution media.
Code [sig002a]
signs of intrusion and cleaned up. The indicated binary should be
The signature for the indicated file matches a signature obtained
signs of intrusion and cleaned up. The indicated binary should be
The signature for the indicated file matches a signature obtained
signs of intrusion and cleaned up. The indicated binary should be
Code [sig002a]
signs of intrusion and cleaned up. The indicated binary should be
The signature for the indicated file matches a signature obtained
The signature for the indicated file matches a signature obtained
signs of intrusion and cleaned up. The indicated binary should be
The signature for the indicated file matches a signature obtained
signs of intrusion and cleaned up. The indicated binary should be
signs of intrusion and cleaned up. The indicated binary should be
from a binary known to have been altered. This indicates that the
Code [sig003w]
from a binary known to have been altered. This indicates that the
signs of intrusion and cleaned up. The indicated binary should be
The signature for the indicated file matches a signature obtained
The signature for the indicated file matches a signature obtained
replaced from distribution media.
from a binary known to have been altered. This indicates that the
replaced from distribution media.
The signature for the indicated file matches a signature obtained
from a binary known to have been altered. This indicates that the
Code [sig003w]
system has been compromised. The system should be checked for other
system has been compromised. The system should be checked for other
from a binary known to have been altered. This indicates that the
Code [sig003w]
from a binary known to have been altered. This indicates that the
system has been compromised. The system should be checked for other
Code [sig003w]
Code [sig003w]
Code [sig003w]
Code [sig003w]
system has been compromised. The system should be checked for other
signs of intrusion and cleaned up. The indicated binary should be
The signature for the indicated file is recognized as the signature
system has been compromised. The system should be checked for other
Code [sig003w]
signs of intrusion and cleaned up. The indicated binary should be
Code [sig003w]
Code [sig003w]
system has been compromised. The system should be checked for other
signs of intrusion and cleaned up. The indicated binary should be
Code [sig003w]
signs of intrusion and cleaned up. The indicated binary should be
Code [sig003w]
Code [sig003w]
Code [sig003w]
system has been compromised. The system should be checked for other
signs of intrusion and cleaned up. The indicated binary should be
Code [sig003w]
signs of intrusion and cleaned up. The indicated binary should be
Code [sig003w]
signs of intrusion and cleaned up. The indicated binary should be
signs of intrusion and cleaned up. The indicated binary should be
replaced from distribution media.
Code [sig003w]
The signature for the indicated file is recognized as the signature
signs of intrusion and cleaned up. The indicated binary should be
signs of intrusion and cleaned up. The indicated binary should be
The signature for the indicated file is recognized as the signature
replaced from distribution media.
replaced from distribution media.
version of the security patch exists. The file is out of date and
from a binary for which either a security patch exists, or a newer
The signature for the indicated file is recognized as the signature
replaced from distribution media.
signs of intrusion and cleaned up. The indicated binary should be
from a binary for which either a security patch exists, or a newer
replaced from distribution media.
The signature for the indicated file is recognized as the signature
signs of intrusion and cleaned up. The indicated binary should be
The signature for the indicated file is recognized as the signature
replaced from distribution media.
The signature for the indicated file is recognized as the signature
signs of intrusion and cleaned up. The indicated binary should be
The signature for the indicated file is recognized as the signature
The signature for the indicated file is recognized as the signature
The signature for the indicated file is recognized as the signature
replaced from distribution media.
replaced from distribution media.
replaced from distribution media.
The signature for the indicated file is recognized as the signature
The signature for the indicated file is recognized as the signature
replaced from distribution media.
replaced from distribution media.
signs of intrusion and cleaned up. The indicated binary should be
The signature for the indicated file is recognized as the signature
Code [sig003w]
Code [sig003w]
version of the security patch exists. The file is out of date and
Code [sig003w]
from a binary for which either a security patch exists, or a newer
Code [sig003w]
Code [sig003w]
should be replaced with one from the indicated patch.
version of the security patch exists. The file is out of date and
Code [sig003w]
version of the security patch exists. The file is out of date and
Code [sig003w]
Code [sig003w]
version of the security patch exists. The file is out of date and
Code [sig003w]
Code [sig003w]
version of the security patch exists. The file is out of date and
The signature for the indicated file is recognized as the signature
Code [sig003w]
version of the security patch exists. The file is out of date and
Code [sig003w]
version of the security patch exists. The file is out of date and
Code [sig003w]
Code [sig003w]
The signature for the indicated file is recognized as the signature
version of the security patch exists. The file is out of date and
The signature for the indicated file is recognized as the signature
should be replaced with one from the indicated patch.
Code [sig004w]
Code [sig003w]
The signature for the indicated file is recognized as the signature
Code [sig003w]
Code [sig003w]
Code [sig003w]
The signature for the indicated file is recognized as the signature
should be replaced with one from the indicated patch.
The signature for the indicated file is recognized as the signature
The signature for the indicated file is recognized as the signature
The signature for the indicated file is recognized as the signature
should be replaced with one from the indicated patch.
The signature for the indicated file is recognized as the signature
Code [sig004w]
Code [sig004w]
The signature for the indicated file is recognized as the signature
The signature for the indicated file is recognized as the signature
Code [sig004w]
Code [sig004w]
Code [sig004w]
version of the security patch exists. The file is out of date and
Code [sig004w]
from a binary for which either a security patch exists, or a newer
version of the security patch exists. The file is out of date and
No match was found for the signature of the indicated file. This
from a binary for which either a security patch exists, or a newer
Code [sig004w]
Code [sig004w]
version of the security patch exists. The file is out of date and
Code [sig004w]
Code [sig004w]
Code [sig004w]
version of the security patch exists. The file is out of date and
Code [sig004w]
version of the security patch exists. The file is out of date and
version of the security patch exists. The file is out of date and
version of the security patch exists. The file is out of date and
should be replaced with one from the indicated patch.
from a binary for which either a security patch exists, or a newer
version of the security patch exists. The file is out of date and
Code [sig004w]
Code [sig004w]
No match was found for the signature of the indicated file. This
version of the security patch exists. The file is out of date and
No match was found for the signature of the indicated file. This
Code [sig004w]
version of the security patch exists. The file is out of date and
Code [sig004w]
version of the security patch exists. The file is out of date and
should be replaced with one from the indicated patch.
No match was found for the signature of the indicated file. This
should be replaced with one from the indicated patch.
indicates either a local modification has been performed, replacing
the binary, or that the file has been altered by an intruder. If
should be replaced with one from the indicated patch.
version of the security patch exists. The file is out of date and
version of the security patch exists. The file is out of date and
No match was found for the signature of the indicated file. This
version of the security patch exists. The file is out of date and
No match was found for the signature of the indicated file. This
No match was found for the signature of the indicated file. This
should be replaced with one from the indicated patch.
indicates either a local modification has been performed, replacing
should be replaced with one from the indicated patch.
No match was found for the signature of the indicated file. This
No match was found for the signature of the indicated file. This
No match was found for the signature of the indicated file. This
No match was found for the signature of the indicated file. This
should be replaced with one from the indicated patch.
should be replaced with one from the indicated patch.
should be replaced with one from the indicated patch.
Code [sig004w]
Code [sig004w]
Code [sig004w]
Code [sig004w]
the binary, or that the file has been altered by an intruder. If
carefully.
the binary, or that the file has been altered by an intruder. If
Code [sig004w]
Code [sig004w]
the binary, or that the file has been altered by an intruder. If
Code [sig004w]
you are not aware of any local modifications, you should check this
the binary, or that the file has been altered by an intruder. If
Code [sig004w]
the binary, or that the file has been altered by an intruder. If
Code [sig004w]
No match was found for the signature of the indicated file. This
the binary, or that the file has been altered by an intruder. If
Code [sig004w]
Code [sig004w]
Code [sig004w]
Code [sig004w]
the binary, or that the file has been altered by an intruder. If
you are not aware of any local modifications, you should check this
No match was found for the signature of the indicated file. This
you are not aware of any local modifications, you should check this
Code [sig004w]
No match was found for the signature of the indicated file. This
No match was found for the signature of the indicated file. This
the binary, or that the file has been altered by an intruder. If
the binary, or that the file has been altered by an intruder. If
carefully.
Code [sig004w]
Code [sig004w]
No match was found for the signature of the indicated file. This
Code [sig004w]
you are not aware of any local modifications, you should check this
you are not aware of any local modifications, you should check this
you are not aware of any local modifications, you should check this
No match was found for the signature of the indicated file. This
carefully.
you are not aware of any local modifications, you should check this
you are not aware of any local modifications, you should check this
No match was found for the signature of the indicated file. This
No match was found for the signature of the indicated file. This
you are not aware of any local modifications, you should check this
No match was found for the signature of the indicated file. This
indicates either a local modification has been performed, replacing
Code [sig004w]
you are not aware of any local modifications, you should check this
No match was found for the signature of the indicated file. This
No match was found for the signature of the indicated file. This
No match was found for the signature of the indicated file. This
you are not aware of any local modifications, you should check this
you are not aware of any local modifications, you should check this
carefully.
No match was found for the signature of the indicated file. This
Code [sig005e]
indicates either a local modification has been performed, replacing
indicates either a local modification has been performed, replacing
indicates either a local modification has been performed, replacing
No match was found for the signature of the indicated file. This
carefully.
you are not aware of any local modifications, you should check this
No match was found for the signature of the indicated file. This
you are not aware of any local modifications, you should check this
Code [sig005e]
Something prevented the system from reading the indicated file. This
the binary, or that the file has been altered by an intruder. If
the binary, or that the file has been altered by an intruder. If
indicates either a local modification has been performed, replacing
the binary, or that the file has been altered by an intruder. If
indicates either a local modification has been performed, replacing
indicates either a local modification has been performed, replacing
carefully.
Code [sig005e]
Code [sig005e]
indicates either a local modification has been performed, replacing
the binary, or that the file has been altered by an intruder. If
Code [sig005e]
Code [sig005e]
the binary, or that the file has been altered by an intruder. If
should not occur if the security system is run from the root account
you are not aware of any local modifications, you should check this
Code [sig005e]
you are not aware of any local modifications, you should check this
Code [sig005e]
Code [sig005e]
you are not aware of any local modifications, you should check this
the binary, or that the file has been altered by an intruder. If
Something prevented the system from reading the indicated file. This
Code [sig005e]
Code [sig005e]
Code [sig005e]
you are not aware of any local modifications, you should check this
Code [sig005e]
carefully.
you are not aware of any local modifications, you should check this
you are not aware of any local modifications, you should check this
you are not aware of any local modifications, you should check this
you are not aware of any local modifications, you should check this
Something prevented the system from reading the indicated file. This
the binary, or that the file has been altered by an intruder. If
you are not aware of any local modifications, you should check this
Code [sig005e]
Code [sig005e]
should not occur if the security system is run from the root account
Code [sig005e]
you are not aware of any local modifications, you should check this
carefully.
Something prevented the system from reading the indicated file. This
Something prevented the system from reading the indicated file. This
you are not aware of any local modifications, you should check this
carefully.
Code [sig005e]
you are not aware of any local modifications, you should check this
on a non-MLS system.
Something prevented the system from reading the indicated file. This
you are not aware of any local modifications, you should check this
you are not aware of any local modifications, you should check this
carefully.
Something prevented the system from reading the indicated file. This
should not occur if the security system is run from the root account
carefully.
Something prevented the system from reading the indicated file. This
Something prevented the system from reading the indicated file. This
Something prevented the system from reading the indicated file. This
you are not aware of any local modifications, you should check this
carefully.
Something prevented the system from reading the indicated file. This
Something prevented the system from reading the indicated file. This
carefully.
carefully.
Code [sig005e]
should not occur if the security system is run from the root account
Code [sig006w]
Code [sig005e]
Code [sig005e]
Code [sig005e]
on a non-MLS system.
Code [sig005e]
Code [sig005e]
Code [sig005e]
Something prevented the system from reading the indicated file. This
on a non-MLS system.
Code [sig005e]
on a non-MLS system.
Code [sig005e]
Code [sig005e]
Code [sig005e]
on a non-MLS system.
Code [sig006w]
Code [sig005e]
Code [sig005e]
Code [sig005e]
CERT Advisory CA-92:11
Code [sig005e]
on a non-MLS system.
on a non-MLS system.
Something prevented the system from reading the indicated file. This
Something prevented the system from reading the indicated file. This
on a non-MLS system.
on a non-MLS system.
Code [sig005e]
Something prevented the system from reading the indicated file. This
Something prevented the system from reading the indicated file. This
Code [sig006w]
Something prevented the system from reading the indicated file. This
Code [sig005e]
Code [sig006w]
should not occur if the security system is run from the root account
Something prevented the system from reading the indicated file. This
Code [sig005e]
CERT Advisory CA-92:11
Code [sig006w]
Something prevented the system from reading the indicated file. This
Code [sig006w]
Code [sig006w]
should not occur if the security system is run from the root account
should not occur if the security system is run from the root account
Code [sig006w]
Code [sig006w]
Code [sig006w]
CERT Advisory CA-92:11
Something prevented the system from reading the indicated file. This
should not occur if the security system is run from the root account
Code [sig006w]
Code [sig006w]
should not occur if the security system is run from the root account
should not occur if the security system is run from the root account
should not occur if the security system is run from the root account
Code [sig006w]
should not occur if the security system is run from the root account
should not occur if the security system is run from the root account
on a non-MLS system.
CERT Advisory CA-92:11
Something prevented the system from reading the indicated file. This
should not occur if the security system is run from the root account
Code [sig006w]
Code [sig006w]
Code [sig006w]
Code [sig006w]
CERT Advisory CA-92:11
should not occur if the security system is run from the root account
CERT Advisory CA-92:11
on a non-MLS system.
A vulnerability exists with regard to certain environment variables
should not occur if the security system is run from the root account
should not occur if the security system is run from the root account
should not occur if the security system is run from the root account
CERT Advisory CA-92:11
on a non-MLS system.
on a non-MLS system.
on a non-MLS system.
CERT Advisory CA-92:11
CERT Advisory CA-92:11
CERT Advisory CA-92:11
CERT Advisory CA-92:11
on a non-MLS system.
should not occur if the security system is run from the root account
CERT Advisory CA-92:11
on a non-MLS system.
on a non-MLS system.
on a non-MLS system.
CERT Advisory CA-92:11
on a non-MLS system.
on a non-MLS system.
on a non-MLS system.
used in SunOS 4.x systems. These vulnerabilities can occur in other
on a non-MLS system.
on a non-MLS system.
on a non-MLS system.
on a non-MLS system.
Code [sig006w]
Code [sig006w]
A vulnerability exists with regard to certain environment variables
Code [sig006w]
Code [sig006w]
Code [sig006w]
Code [sig006w]
A vulnerability exists with regard to certain environment variables
Code [sig006w]
Code [sig006w]
Code [sig006w]
Code [sig006w]
A vulnerability exists with regard to certain environment variables
used in SunOS 4.x systems. These vulnerabilities can occur in other
Code [sig006w]
CERT Advisory CA-92:11
A vulnerability exists with regard to certain environment variables
used in SunOS 4.x systems. These vulnerabilities can occur in other
Code [sig006w]
setuid executables than the ones checked here (including third party
Code [sig006w]
Code [sig006w]
CERT Advisory CA-92:11
A vulnerability exists with regard to certain environment variables
A vulnerability exists with regard to certain environment variables
used in SunOS 4.x systems. These vulnerabilities can occur in other
A vulnerability exists with regard to certain environment variables
A vulnerability exists with regard to certain environment variables
CERT Advisory CA-92:11
software). The following patches are available to fix Sun supplied
to perform the checks for altered binaries and installed security
to perform the checks for altered binaries and installed security
system.
system.
It may also indicate an incorrect configuration of the security checking
system.
system.
It may also indicate an incorrect configuration of the security checking
to perform the checks for altered binaries and installed security
system.
to perform the checks for altered binaries and installed security
to perform the checks for altered binaries and installed security
patches.
to perform the checks for altered binaries and installed security
system.
It may also indicate an incorrect configuration of the security checking
system.
system.
It may also indicate an incorrect configuration of the security checking
system.
to perform the checks for altered binaries and installed security
to perform the checks for altered binaries and installed security
to perform the checks for altered binaries and installed security
to perform the checks for altered binaries and installed security
system.
to perform the checks for altered binaries and installed security
system.
system.
to perform the checks for altered binaries and installed security
to perform the checks for altered binaries and installed security
system.
patches.
patches.
patches.
Because the signature database does not exist, it will not be possible
The signature for the indicated file matches a signature obtained
Because the signature database does not exist, it will not be possible
Because the signature database does not exist, it will not be possible
Because the signature database does not exist, it will not be possible
Because the signature database does not exist, it will not be possible
Because the signature database does not exist, it will not be possible
Because the signature database does not exist, it will not be possible
Because the signature database does not exist, it will not be possible
signs of intrusion and cleaned up. The indicated binary should be
system has been compromised. The system should be checked for other
from a binary known to have been altered. This indicates that the
from a binary known to have been altered. This indicates that the
from a binary known to have been altered. This indicates that the
patches.
patches.
from a binary known to have been altered. This indicates that the
system has been compromised. The system should be checked for other
from a binary known to have been altered. This indicates that the
from a binary known to have been altered. This indicates that the
patches.
from a binary known to have been altered. This indicates that the
from a binary known to have been altered. This indicates that the
from a binary known to have been altered. This indicates that the
patches.
from a binary known to have been altered. This indicates that the
from a binary known to have been altered. This indicates that the
from a binary known to have been altered. This indicates that the
system has been compromised. The system should be checked for other
system has been compromised. The system should be checked for other
replaced from distribution media.
system has been compromised. The system should be checked for other
system has been compromised. The system should be checked for other
system has been compromised. The system should be checked for other
system has been compromised. The system should be checked for other
system has been compromised. The system should be checked for other
The signature for the indicated file matches a signature obtained
signs of intrusion and cleaned up. The indicated binary should be
The signature for the indicated file matches a signature obtained
replaced from distribution media.
The signature for the indicated file matches a signature obtained
from a binary known to have been altered. This indicates that the
replaced from distribution media.
from a binary known to have been altered. This indicates that the
replaced from distribution media.
The signature for the indicated file matches a signature obtained
from a binary known to have been altered. This indicates that the
replaced from distribution media.
replaced from distribution media.
from a binary known to have been altered. This indicates that the
replaced from distribution media.
replaced from distribution media.
from a binary known to have been altered. This indicates that the
replaced from distribution media.
The signature for the indicated file matches a signature obtained
replaced from distribution media.
from a binary known to have been altered. This indicates that the
from a binary known to have been altered. This indicates that the
from a binary known to have been altered. This indicates that the
replaced from distribution media.
replaced from distribution media.
system has been compromised. The system should be checked for other
replaced from distribution media.
system has been compromised. The system should be checked for other
The signature for the indicated file is recognized as the signature
from a binary known to have been altered. This indicates that the
replaced from distribution media.
from a binary known to have been altered. This indicates that the
system has been compromised. The system should be checked for other
system has been compromised. The system should be checked for other
from a binary known to have been altered. This indicates that the
system has been compromised. The system should be checked for other
from a binary known to have been altered. This indicates that the
system has been compromised. The system should be checked for other
system has been compromised. The system should be checked for other
system has been compromised. The system should be checked for other
system has been compromised. The system should be checked for other
signs of intrusion and cleaned up. The indicated binary should be
from a binary for which either a security patch exists, or a newer
system has been compromised. The system should be checked for other
system has been compromised. The system should be checked for other
signs of intrusion and cleaned up. The indicated binary should be
signs of intrusion and cleaned up. The indicated binary should be
The signature for the indicated file is recognized as the signature
signs of intrusion and cleaned up. The indicated binary should be
replaced from distribution media.
The signature for the indicated file is recognized as the signature
The signature for the indicated file is recognized as the signature
from a binary for which either a security patch exists, or a newer
replaced from distribution media.
replaced from distribution media.
should be replaced with one from the indicated patch.
from a binary for which either a security patch exists, or a newer
version of the security patch exists. The file is out of date and
from a binary for which either a security patch exists, or a newer
replaced from distribution media.
version of the security patch exists. The file is out of date and
from a binary for which either a security patch exists, or a newer
replaced from distribution media.
from a binary for which either a security patch exists, or a newer
replaced from distribution media.
from a binary for which either a security patch exists, or a newer
from a binary for which either a security patch exists, or a newer
from a binary for which either a security patch exists, or a newer
from a binary for which either a security patch exists, or a newer
from a binary for which either a security patch exists, or a newer
from a binary for which either a security patch exists, or a newer
from a binary for which either a security patch exists, or a newer
replaced from distribution media.
from a binary for which either a security patch exists, or a newer
version of the security patch exists. The file is out of date and
should be replaced with one from the indicated patch.
version of the security patch exists. The file is out of date and
version of the security patch exists. The file is out of date and
version of the security patch exists. The file is out of date and
version of the security patch exists. The file is out of date and
version of the security patch exists. The file is out of date and
should be replaced with one from the indicated patch.
The signature for the indicated file is recognized as the signature
should be replaced with one from the indicated patch.
The signature for the indicated file is recognized as the signature
should be replaced with one from the indicated patch.
should be replaced with one from the indicated patch.
should be replaced with one from the indicated patch.
should be replaced with one from the indicated patch.
The signature for the indicated file is recognized as the signature
from a binary for which either a security patch exists, or a newer
should be replaced with one from the indicated patch.
The signature for the indicated file is recognized as the signature
should be replaced with one from the indicated patch.
should be replaced with one from the indicated patch.
from a binary for which either a security patch exists, or a newer
The signature for the indicated file is recognized as the signature
should be replaced with one from the indicated patch.
should be replaced with one from the indicated patch.
The signature for the indicated file is recognized as the signature
from a binary for which either a security patch exists, or a newer
from a binary for which either a security patch exists, or a newer
No match was found for the signature of the indicated file. This
from a binary for which either a security patch exists, or a newer
from a binary for which either a security patch exists, or a newer
version of the security patch exists. The file is out of date and
from a binary for which either a security patch exists, or a newer
from a binary for which either a security patch exists, or a newer
from a binary for which either a security patch exists, or a newer
from a binary for which either a security patch exists, or a newer
The signature for the indicated file is recognized as the signature
from a binary for which either a security patch exists, or a newer
from a binary for which either a security patch exists, or a newer
from a binary for which either a security patch exists, or a newer
from a binary for which either a security patch exists, or a newer
version of the security patch exists. The file is out of date and
No match was found for the signature of the indicated file. This
version of the security patch exists. The file is out of date and
indicates either a local modification has been performed, replacing
from a binary for which either a security patch exists, or a newer
should be replaced with one from the indicated patch.
version of the security patch exists. The file is out of date and
No match was found for the signature of the indicated file. This
No match was found for the signature of the indicated file. This
should be replaced with one from the indicated patch.
indicates either a local modification has been performed, replacing
indicates either a local modification has been performed, replacing
No match was found for the signature of the indicated file. This
should be replaced with one from the indicated patch.
No match was found for the signature of the indicated file. This
should be replaced with one from the indicated patch.
should be replaced with one from the indicated patch.
you are not aware of any local modifications, you should check this
the binary, or that the file has been altered by an intruder. If
indicates either a local modification has been performed, replacing
should be replaced with one from the indicated patch.
indicates either a local modification has been performed, replacing
should be replaced with one from the indicated patch.
should be replaced with one from the indicated patch.
indicates either a local modification has been performed, replacing
indicates either a local modification has been performed, replacing
indicates either a local modification has been performed, replacing
indicates either a local modification has been performed, replacing
indicates either a local modification has been performed, replacing
the binary, or that the file has been altered by an intruder. If
indicates either a local modification has been performed, replacing
should be replaced with one from the indicated patch.
indicates either a local modification has been performed, replacing
indicates either a local modification has been performed, replacing
the binary, or that the file has been altered by an intruder. If
the binary, or that the file has been altered by an intruder. If
indicates either a local modification has been performed, replacing
indicates either a local modification has been performed, replacing
you are not aware of any local modifications, you should check this
the binary, or that the file has been altered by an intruder. If
the binary, or that the file has been altered by an intruder. If
the binary, or that the file has been altered by an intruder. If
you are not aware of any local modifications, you should check this
carefully.
No match was found for the signature of the indicated file. This
carefully.
carefully.
indicates either a local modification has been performed, replacing
No match was found for the signature of the indicated file. This
carefully.
indicates either a local modification has been performed, replacing
carefully.
carefully.
indicates either a local modification has been performed, replacing
carefully.
carefully.
the binary, or that the file has been altered by an intruder. If
indicates either a local modification has been performed, replacing
indicates either a local modification has been performed, replacing
indicates either a local modification has been performed, replacing
indicates either a local modification has been performed, replacing
No match was found for the signature of the indicated file. This
carefully.
carefully.
indicates either a local modification has been performed, replacing
indicates either a local modification has been performed, replacing
carefully.
indicates either a local modification has been performed, replacing
the binary, or that the file has been altered by an intruder. If
the binary, or that the file has been altered by an intruder. If
the binary, or that the file has been altered by an intruder. If
you are not aware of any local modifications, you should check this
the binary, or that the file has been altered by an intruder. If
the binary, or that the file has been altered by an intruder. If
the binary, or that the file has been altered by an intruder. If
Something prevented the system from reading the indicated file. This
the binary, or that the file has been altered by an intruder. If
you are not aware of any local modifications, you should check this
the binary, or that the file has been altered by an intruder. If
the binary, or that the file has been altered by an intruder. If
the binary, or that the file has been altered by an intruder. If
carefully.
carefully.
carefully.
should not occur if the security system is run from the root account
you are not aware of any local modifications, you should check this
Something prevented the system from reading the indicated file. This
on a non-MLS system.
Something prevented the system from reading the indicated file. This
Something prevented the system from reading the indicated file. This
carefully.
should not occur if the security system is run from the root account
Something prevented the system from reading the indicated file. This
carefully.
carefully.
should not occur if the security system is run from the root account
carefully.
should not occur if the security system is run from the root account
carefully.
should not occur if the security system is run from the root account
on a non-MLS system.
should not occur if the security system is run from the root account
carefully.
should not occur if the security system is run from the root account
should not occur if the security system is run from the root account
should not occur if the security system is run from the root account
on a non-MLS system.
carefully.
should not occur if the security system is run from the root account
should not occur if the security system is run from the root account
should not occur if the security system is run from the root account
on a non-MLS system.
should not occur if the security system is run from the root account
on a non-MLS system.
on a non-MLS system.
on a non-MLS system.
on a non-MLS system.
Something prevented the system from reading the indicated file. This
Something prevented the system from reading the indicated file. This
Something prevented the system from reading the indicated file. This
Something prevented the system from reading the indicated file. This
Something prevented the system from reading the indicated file. This
Something prevented the system from reading the indicated file. This
Something prevented the system from reading the indicated file. This
should not occur if the security system is run from the root account
Something prevented the system from reading the indicated file. This
should not occur if the security system is run from the root account
should not occur if the security system is run from the root account
A vulnerability exists with regard to certain environment variables
on a non-MLS system.
CERT Advisory CA-92:11
CERT Advisory CA-92:11
CERT Advisory CA-92:11
CERT Advisory CA-92:11
A vulnerability exists with regard to certain environment variables
A vulnerability exists with regard to certain environment variables
on a non-MLS system.
used in SunOS 4.x systems. These vulnerabilities can occur in other
setuid executables than the ones checked here (including third party
A vulnerability exists with regard to certain environment variables
A vulnerability exists with regard to certain environment variables
A vulnerability exists with regard to certain environment variables
A vulnerability exists with regard to certain environment variables
A vulnerability exists with regard to certain environment variables