Description: | Description:
The remote host is missing updates announced in advisory TSLSA-2007-0003.
bzip2 < TSL 3.0 > < TSL 2.2 > < TSEL 2 > - SECURITY Fix: Fixes a race condition which allows local users to modify permissions of arbitrary files via a hard link attack on a file while it is being decompressed, whose permissions are changed by bzip2 after the decompression is complete.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2005-0953 to this issue.
kerberos5 < TSL 3.0 > - SECURITY Fix: The RPC library used in Kerberos administration daemon (kadmind) and other products that use this library, calls an uninitialized function pointer in freed memory, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unspecified vectors.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2006-6143 to this issue.
squid < TSL 3.0 > < TSL 2.2 > < TSEL 2 > - SECURITY Fix: An error in handling of certain FTP URL requests can be exploited to crash Squid by visiting a specially crafted FTP URL via the proxy.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2007-0247 to this issue.
wget < TSL 3.0 > < TSL 2.2 > < TSEL 2 > - SECURITY Fix: The ftp_syst function in ftp-basic.c allows remote attackers to cause a denial of service (application crash) via a malicious FTP server with a large number of blank 220 responses to the SYST command.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2006-6719 to this issue.
xorg-x11 < TSL 3.0 > - SECURITY Fix: Sean Larsson has reported some vulnerabilities in X.Org X11, caused due to input validation errors within the ProcRenderAddGlyphs() function of the Renderer extension and the ProcDbeGetVisualInfo() and ProcDbeSwapBuffers() functions of the DBE extension. This can be exploited to cause a memory corruption by sending specially crafted X requests to the X server.
The Common Vulnerabilities and Exposures project has assigned the names CVE-2006-6101, CVE-2006-6102 and CVE-2006-6103 to these issues.
Solution: Update your system with the packages as indicated in the referenced security advisory.
http://www.securityspace.com/smysecure/catid.html?in=TSLSA-2007-0003
Risk factor : Critical
CVSS Score: 10.0
|