|Category:||Mandrake Local Security Checks|
|Title:||Mandriva Security Advisory MDVSA-2010:181 (ntop)|
|Summary:||Mandriva Security Advisory MDVSA-2010:181 (ntop)|
|Description:||The remote host is missing an update to ntop|
announced via advisory MDVSA-2010:181.
A vulnerability has been found and corrected in ntop:
The checkHTTPpassword function in http.c in ntop 3.3.10 and earlier
allows remote attackers to cause a denial of service (NULL pointer
dereference and daemon crash) via an Authorization HTTP header
that lacks a : (colon) character in the base64-decoded string
The updated packages have been patched to correct this issue.
Affected: Corporate 4.0
To upgrade automatically use MandrakeUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
Risk factor : Medium
Common Vulnerability Exposure (CVE) ID: CVE-2009-2732|
Bugtraq: 20090818 (Reposting truncated message) Re: ntop <= 3.3.10 Basic Authentication Null Pointer Denial of Service (Google Search)
Bugtraq: 20090818 ntop <= 3.3.10 Basic Authentication Null Pointer Denial of Service (Google Search)
|Copyright||Copyright (c) 2010 E-Soft Inc. http://www.securityspace.com|
|This is only one of 47891 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.