![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.54112 |
Category: | SuSE Local Security Checks |
Title: | SuSE Security Advisory SUSE-SA:2003:0008 (imp) |
Summary: | NOSUMMARY |
Description: | Description: The remote host is missing updates announced in advisory SUSE-SA:2003:0008. IMP is a well known PHP-based web-mail system. Some SQL-injection vulnerabilities were found in IMP 2.x that allow an attacker to access the underlying database. No authentication is needed to exploit this bug. An attacker can gain access to protected information or, in conjunction with PostgreSQL, execute shell commands remotely. Solution: Update your system with the packages as indicated in the referenced security advisory. http://www.securityspace.com/smysecure/catid.html?in=SUSE-SA:2003:0008 Risk factor : High CVSS Score: 7.5 |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2003-0025 BugTraq ID: 6559 http://www.securityfocus.com/bid/6559 Bugtraq: 20030108 IMP 2.x SQL injection vulnerabilities (Google Search) http://marc.info/?l=bugtraq&m=104204786206563&w=2 Bugtraq: 20030108 Re: IMP 2.x SQL injection vulnerabilities (Google Search) http://www.securityfocus.com/archive/1/306268 Debian Security Information: DSA-229 (Google Search) http://www.debian.org/security/2003/dsa-229 http://www.securitytracker.com/id?1005904 http://secunia.com/advisories/8087 http://secunia.com/advisories/8177 SuSE Security Announcement: SuSE-SA:2003:0008 (Google Search) |
Copyright | Copyright (c) 2005 E-Soft Inc. http://www.securityspace.com |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |