|
Test ID: | 1.3.6.1.4.1.25623.1.0.52409 |
Category: | FreeBSD Local Security Checks |
Title: | FreeBSD Ports: ripmime |
Summary: | FreeBSD Ports: ripmime |
Description: | Description: The remote host is missing an update to the system as announced in the referenced advisory. The following package is affected: ripmime The installed version of ripmime can be fooled into improper decoding of an attachment, meaning that malicious content such as a virus or a trojan that should have been caught by the scanning engine will instead be passed on to the end-user. Solution: Update your system with the appropriate patches or software upgrades. http://www.osvdb.org/8287 http://www.pldaniels.com/ripmime/CHANGELOG http://secunia.com/advisories/12201 http://xforce.iss.net/xforce/xfdb/16867 http://www.vuxml.org/freebsd/85e19dff-e606-11d8-9b0a-000347a4fa7d.html CVSS Score: 7.5 CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P |
Cross-Ref: |
BugTraq ID: 10848 Common Vulnerability Exposure (CVE) ID: CVE-2004-2619 http://www.securityfocus.com/bid/10848 http://www.osvdb.org/8287 http://secunia.com/advisories/12201 XForce ISS Database: ripmime-attachment-filters-bypass(16867) https://exchange.xforce.ibmcloud.com/vulnerabilities/16867 |
Copyright | Copyright (c) 2005 E-Soft Inc. http://www.securityspace.com |
This is only one of 58962 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |
|