![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.51715 |
Category: | Fedora Local Security Checks |
Title: | Fedora Legacy Security Advisory FLSA-2005:1944 |
Summary: | NOSUMMARY |
Description: | Description: The remote host is missing updates announced in advisory FLSA-2005:1944. GNOME VFS is the GNOME virtual file system. It provides a modular architecture and ships with several modules that implement support for file systems, HTTP, FTP, and others. The extfs backends make it possible to implement file systems for GNOME VFS using scripts. Flaws have been found in several of the GNOME VFS extfs backend scripts. Red Hat Linux ships with vulnerable scripts, but they are not used by default. An attacker who is able to influence a user to open a specially-crafted URI using gnome-vfs could perform actions as that user. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2004-0494 to this issue. Users of Red Hat Linux should upgrade to these updated packages, which remove these unused scripts. Affected platforms: Redhat 7.3 Redhat 9 Solution: http://www.securityspace.com/smysecure/catid.html?in=FLSA-2005:1944 Risk factor : High CVSS Score: 7.5 |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2004-0494 https://bugzilla.fedora.us/show_bug.cgi?id=1944 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9854 http://www.redhat.com/support/errata/RHSA-2004-373.html XForce ISS Database: gnome-vfs-extfs-gain-access(16897) https://exchange.xforce.ibmcloud.com/vulnerabilities/16897 |
Copyright | Copyright (c) 2005 E-Soft Inc. http://www.securityspace.com |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |