Description: | Description:
The remote host is missing updates announced in advisory TSLSA-2007-0005.
bind < TSL 3.0 > < TSL 2.2 > < TSEL 2 > - New Upstream. - SECURITY Fix: Some vulnerabilities have been reported in ISC BIND, which can be exploited by malicious people to cause a DoS. An unspecified error may cause the named daemon to dereference a freed fetch context. - Another vulnerability in ISC BIND allows remote attackers to cause a denial of service (exit) via a type * (ANY) DNS query response that contains multiple RRsets, which triggers an assertion error, aka the DNSSEC Validation vulnerability.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the names CVE-2007-0493 and CVE-2007-0494 to these issues.
ed < TSL 3.0 > < TSL 2.2 > < TSEL 2 > - New upstream. - SECURITY FIX: A vulnerability has been identified in the open_sbuf() [buf.c] function that handles temporary files in an insecure manner, which could allow malicious users to conduct symlink attacks and create or overwrite arbitrary files with the privileges of the user invoking the vulnerable application.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2006-6939 to this issue.
elinks < TSL 3.0 > - New upstream. - SECURITY Fix: Teemu Salmela has discovered a vulnerability, which is caused due to an error in the validation of smb:// URLs when Links runs smbclient commands. This can be exploited to download and overwrite local files or upload local files to an SMB share by injecting smbclient commands in the smb:// URL.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the names CVE-2006-5925 to this issue.
Solution: Update your system with the packages as indicated in the referenced security advisory.
http://www.securityspace.com/smysecure/catid.html?in=TSLSA-2007-0005
Risk factor : High
CVSS Score: 7.8
|