|Category:||Mandrake Local Security Checks|
|Title:||Mandrake Security Advisory MDKSA-2005:027 (chbg)|
|Summary:||Mandrake Security Advisory MDKSA-2005:027 (chbg)|
The remote host is missing an update to chbg
announced via advisory MDKSA-2005:027.
A vulnerability in chbg was discovered by Danny Lungstrom. A
maliciously-crafted configuration/scenario file could overflow a
buffer leading to the potential execution of arbitrary code.
The updated packages are patched to prevent the problem.
Affected versions: 10.0, 10.1, Corporate Server 3.0
To upgrade automatically use MandrakeUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
Risk factor : Critical
Common Vulnerability Exposure (CVE) ID: CVE-2004-1264|
Debian Security Information: DSA-644 (Google Search)
XForce ISS Database: chbg-simplifypath-bo(18595)
|Copyright||Copyright (c) 2005 E-Soft Inc. http://www.securityspace.com|
|This is only one of 50192 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.