|Category:||FreeBSD Local Security Checks|
|Title:||FreeBSD Ports: ripmime|
|Summary:||FreeBSD Ports: ripmime|
The remote host is missing an update to the system
as announced in the referenced advisory.
The following package is affected: ripmime
The installed version of ripmime can be fooled into
improper decoding of an attachment, meaning that
malicious content such as a virus or a trojan that
should have been caught by the scanning engine will
instead be passed on to the end-user.
Update your system with the appropriate patches or
BugTraq ID: 10848|
Common Vulnerability Exposure (CVE) ID: CVE-2004-2619
XForce ISS Database: ripmime-attachment-filters-bypass(16867)
|Copyright||Copyright (c) 2005 E-Soft Inc. http://www.securityspace.com|
|This is only one of 58962 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.