![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.55094 |
Category: | Fedora Local Security Checks |
Title: | Fedora Core 3 FEDORA-2005-435 (ncpfs) |
Summary: | NOSUMMARY |
Description: | Description: The remote host is missing an update to ncpfs announced via advisory FEDORA-2005-435. Ncpfs is a filesystem which understands the Novell NetWare(TM) NCP protocol. Functionally, NCP is used for NetWare the way NFS is used in the TCP/IP world. For a Linux system to mount a NetWare filesystem, it needs a special mount program. The ncpfs package contains such a mount program plus other tools for configuring and using the ncpfs filesystem. Install the ncpfs package if you need to use the ncpfs filesystem to use Novell NetWare files or services. * Fri Jun 17 2005 Jiri Ryska 2.2.4-4.FC3.1 - fixed getuid security bug CVE-2005-0014 - fixed security bug CVE-2004-1079 * Mon Apr 11 2005 Jiri Ryska 2.2.4-4.FC3 - fixed getuid security bug CVE-2005-0013 Solution: Apply the appropriate updates. This update can be downloaded from: http://download.fedora.redhat.com/pub/fedora/linux/core/updates/3/ This update can also be installed with the Update Agent you can launch the Update Agent with the 'up2date' command. http://www.securityspace.com/smysecure/catid.html?in=FEDORA-2005-435 Risk factor : High CVSS Score: 7.5 |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2005-0014 BugTraq ID: 12400 http://www.securityfocus.com/bid/12400 http://www.securityfocus.com/archive/1/433927/100/0/threaded http://www.gentoo.org/security/en/glsa/glsa-200501-44.xml http://www.mandriva.com/security/advisories?name=MDKSA-2005:028 http://www.osvdb.org/13298 http://securitytracker.com/id?1013019 Common Vulnerability Exposure (CVE) ID: CVE-2004-1079 BugTraq ID: 11945 http://www.securityfocus.com/bid/11945 Bugtraq: 20041129 ncpfs buffer overflow (Google Search) http://marc.info/?l=bugtraq&m=110175523207437&w=2 http://lists.grok.org.uk/pipermail/full-disclosure/2004-November/029563.html http://www.gentoo.org/security/en/glsa/glsa-200412-09.xml XForce ISS Database: ncpfs-nwclientc-bo(18283) https://exchange.xforce.ibmcloud.com/vulnerabilities/18283 Common Vulnerability Exposure (CVE) ID: CVE-2005-0013 Debian Security Information: DSA-665 (Google Search) http://www.debian.org/security/2005/dsa-665 http://www.osvdb.org/13297 http://www.redhat.com/support/errata/RHSA-2005-371.html |
Copyright | Copyright (c) 2005 E-Soft Inc. http://www.securityspace.com |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |