![]() |
Startseite ▼ Bookkeeping
Online ▼ Sicherheits
Überprüfungs ▼
Verwaltetes
DNS ▼
Info
Bestellen/Erneuern
FAQ
AUP
Dynamic DNS Clients
Domaine konfigurieren Dyanmic DNS Update Password Netzwerk
Überwachung ▼
Enterprise
Erweiterte
Standard
Gratis Test
FAQ
Preis/Funktionszusammenfassung
Bestellen
Beispiele
Konfigurieren/Status Alarm Profile | ||
Test Kennung: | 1.3.6.1.4.1.25623.1.0.51566 |
Kategorie: | Conectiva Local Security Checks |
Titel: | Conectiva Security Advisory CLA-2001:402 |
Zusammenfassung: | NOSUMMARY |
Beschreibung: | Description: The remote host is missing updates announced in advisory CLA-2001:402. exim is a popular mail server (MTA) that is included in many GNU/Linux distributions. Megyer Laszlo reported a format bug vulnerability in the exim package that could lead to a compromise if exim is run as root. This software is not installed by default on Conectiva Linux 6.0 and, even if installed, the default configuration is not vulnerable because it does not include the headers_check_syntax option in the /etc/exim.conf configuration file which is needed to trigger the bug. If, however, that option is enabled, and exim is also used to process batched SMTP input (via the -bS command-line option), then the service becomes vulnerable and a remote attack becomes possible. Solution: The apt tool can be used to perform RPM package upgrades by running 'apt-get update' followed by 'apt-get upgrade' http://www.securityspace.com/smysecure/catid.html?in=CLA-2001:402 http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000402 Risk factor : High |
Copyright | Copyright (c) 2005 E-Soft Inc. http://www.securityspace.com |
Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus. Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten. |