|Category:||Debian Local Security Checks|
|Title:||Debian Security Advisory DSA 301-1 (libgtop)|
|Summary:||Debian Security Advisory DSA 301-1 (libgtop)|
|Description:||The remote host is missing an update to libgtop|
announced via advisory DSA 301-1.
The gtop daemon, used for monitoring remote machines, contains a
buffer overflow which could be used by an attacker to execute
arbitrary code with the privileges of the daemon process. If started
as root, the daemon process drops root privileges, assuming uid and
gid 99 by default.
This bug was previously fixed in DSA-098, but one of the patches was
not carried over to later versions of libgtop.
For the stable distribution (woody), this problem has been fixed in
For the old stable distribution (potato), this problem was fixed in
For the unstable distribution (sid), this problem has been fixed in
We recommend that you update your libgtop package.
BugTraq ID: 3594|
Common Vulnerability Exposure (CVE) ID: CVE-2001-0928
Bugtraq: 20011128 Re: [CERT-intexxia] libgtop_daemon Remote Format String Vulnerability (Google Search)
Debian Security Information: DSA-098 (Google Search)
Debian Security Information: DSA-301 (Google Search)
CERT/CC vulnerability note: VU#705771
|Copyright||Copyright (c) 2005 E-Soft Inc. http://www.securityspace.com|
|This is only one of 38907 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.