|Category:||Mandrake Local Security Checks|
|Title:||Mandrake Security Advisory MDKSA-2005:203 (gda2.0)|
|Summary:||Mandrake Security Advisory MDKSA-2005:203 (gda2.0)|
The remote host is missing an update to gda2.0
announced via advisory MDKSA-2005:203.
Steve Kemp discovered two format string vulnerabilities in libgda2,
the GNOME Data Access library for GNOME2, which may lead to the
execution of arbitrary code in programs that use this library.
The updated packages have been patched to correct this issue.
Affected: 10.2, 2006.0, Corporate 3.0
To upgrade automatically use MandrakeUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
Risk factor : High
BugTraq ID: 15200|
Common Vulnerability Exposure (CVE) ID: CVE-2005-2958
Debian Security Information: DSA-871 (Google Search)
SuSE Security Announcement: SUSE-SR:2005:026 (Google Search)
SuSE Security Announcement: SUSE-SR:2005:027 (Google Search)
|Copyright||Copyright (c) 2005 E-Soft Inc. http://www.securityspace.com|
|This is only one of 53744 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.