|Category:||FreeBSD Local Security Checks|
|Title:||FreeBSD Ports: kdeedu|
The remote host is missing an update to the system
as announced in the referenced advisory.
The following package is affected: kdeedu
Multiple vulnerabilities in fliccd, when installed setuid root as part
of the kdeedu Kstars support for Instrument Neutral Distributed
Interface (INDI) in KDE 3.3 to 3.3.2, allow local users and remote
attackers to execute arbitrary code via stack-based buffer overflows.
Update your system with the appropriate patches or
Common Vulnerability Exposure (CVE) ID: CVE-2005-0011|
Bugtraq: 20050215 [KDE Security Advisory] Buffer overflow in fliccd of kdeedu/kstars/indi (Google Search)
|Copyright||Copyright (c) 2005 E-Soft Inc. http://www.securityspace.com|
|This is only one of 69903 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.