|Category:||Mandrake Local Security Checks|
|Title:||Mandrake Security Advisory MDKSA-2003:113 (screen)|
|Summary:||Mandrake Security Advisory MDKSA-2003:113 (screen)|
The remote host is missing an update to screen
announced via advisory MDKSA-2003:113.
A vulnerability was discovered and fixed in screen by Timo Sirainen
who found an exploitable buffer overflow that allowed privilege
escalation. This vulnerability also has the potential to allow
attackers to gain control of another user's screen session. The
ability to exploit is not trivial and requires approximately 2GB
of data to be transferred in order to do so.
Updated packages are available that fix the vulnerability.
Affected versions: 9.0, 9.1, 9.2, Corporate Server 2.1,
Multi Network Firewall 8.2
To upgrade automatically use MandrakeUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
Risk factor : Critical
Common Vulnerability Exposure (CVE) ID: CVE-2003-0972|
Bugtraq: 20031127 GNU screen buffer overflow (Google Search)
Debian Security Information: DSA-408 (Google Search)
Conectiva Linux advisory: CLA-2004:809
|Copyright||Copyright (c) 2005 E-Soft Inc. http://www.securityspace.com|
|This is only one of 40037 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.