Last chance to "test" NTP before patching?

NTP FingerPrinting Tool:
http://www.securiteam.com/tools/6F00Q20EKY.html

Next Generation NTP Reverse Shell:
http://www.securebits.org/presentations/AR_NGRS_HITB_08.ppt

obnosis.com | wiki.obnosis.com| (503)754-4452
PLUG HACKFESTS 2nd Saturday Each Month@Noon - 3PM
Is Economic V i @ g r @ "short in duration"?


Date: Thu, 19 Feb 2009 16:00:16 -0700
From: patchbuilder_noreply@novell.com
To: obnosis@gmail.com
Subject: 19 Feb 2009 Novell Customer Center (1 New Patch)

19 Feb 2009 Novell Customer Center (1 New Patch)

 

Patch Updates

19 Feb 2009

The latest updates to your SUSE Linux Enterprise software are now available. By installing updates regularly, you will keep your operating system at peak performance, remove known security vulnerabilities and software defects, improve stability, and add the newest features and functionality.
To download, simply click the URL(s) that correspond to your version and log in to the Novell download site. You can then install the updates with YaST or your preferred installation tool. Please note: You must have a registered SUSE Linux Enterprise product with upgrade protection in order to access the patch downloads.

  1. Security update for xntp, xntp-doc (ia64)
    • SUSE LINUX Enterprise Server 9

    Security update for xntp, xntp-doc (x86)
    • SUSE LINUX Enterprise Server 9

    Security update for xntp, xntp-doc (s390)
    • SUSE LINUX Enterprise Server 9

    Security update for xntp, xntp-doc (ppc)
    • SUSE LINUX Enterprise Server 9

    Security update for xntp, xntp-doc (x86)
    • Open Enterprise Server (OES)

    Security update for xntp, xntp-doc (s390x)
    • SUSE LINUX Enterprise Server 9

    Security update for xntp, xntp-doc (x86-64)
    • SUSE LINUX Enterprise Server 9

    Security update for xntp, xntp-doc (x86)
    • Novell Linux Desktop 9

    Security update for xntp, xntp-doc (x86-64)
    • Novell Linux Desktop 9

    Security update for xntp, xntp-doc (x86)
    • Linux Point of Service 9




OES Linux servers should only be updated by following the instructions in the applicable documentation:

 


This message was sent to you because of your previous business interactions with Novell.

Novell, Inc. | 404 Wyman Street, Suite 500 | Waltham, MA 02451


---
You are currently subscribed to patch_notifications-daily as: obnosis@gmail.com.
To unsubscribe click here: http://novellevents.novell.com/u?id=64488349.8facd78a60ae0aedae1770a35a360722&n=T&l=patch_notifications-daily&o=9232166
(It may be necessary to cut and paste the above URL if the line is broken)
or send a blank email to leave-9232166-64488349.8facd78a60ae0aedae1770a35a360722@list.novell.com


Want to do more with Windows Live? Learn “10 hidden secrets” from Jamie. Learn Now