![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.59866 |
Category: | Fedora Local Security Checks |
Title: | Fedora Core 8 FEDORA-2007-3235 (link-grammar) |
Summary: | NOSUMMARY |
Description: | Description: The remote host is missing an update to link-grammar announced via advisory FEDORA-2007-3235. A library that can perform grammar checking. Update Information: CVE-2007-5395 is fixed in this release ChangeLog: * Mon Nov 12 2007 Marc Maurer 4.2.5-1 - New upstream version, fixes bug 371221. References: [ 1 ] Bug #371221 - CVE-2007-5395 link-grammar buffer overflow in tokenize.c https://bugzilla.redhat.com/show_bug.cgi?id=371221 Updated packages: 01d3ec0cd390cdeb648cbcc0cb3fed08119675a8 link-grammar-4.2.5-1.fc8.ppc64.rpm af31cdfed7d5ce666e2a5e062ad571b34bb37ab0 link-grammar-debuginfo-4.2.5-1.fc8.ppc64.rpm bb5c46ffe34ebaea97db767024f9ea321c805264 link-grammar-devel-4.2.5-1.fc8.ppc64.rpm d67997130dd3cb06be5e3999af72ef19acf84b6f link-grammar-devel-4.2.5-1.fc8.i386.rpm 6bab2be54cfa867e0fa09be9389a7b7c19115d54 link-grammar-debuginfo-4.2.5-1.fc8.i386.rpm f96ca6242ade9d0f9478fa8857a10f4c8be78f96 link-grammar-4.2.5-1.fc8.i386.rpm 187900ed38247c93eb721749f29788d2db0b9e7f link-grammar-4.2.5-1.fc8.x86_64.rpm e428243124a14c9ec62a77073c610749c449cb01 link-grammar-devel-4.2.5-1.fc8.x86_64.rpm 9d1b37b346cb1d31bfe37cb220457090d11a9310 link-grammar-debuginfo-4.2.5-1.fc8.x86_64.rpm bd00c4e07575648f7b0a39c4f137d630ba051cac link-grammar-4.2.5-1.fc8.ppc.rpm 4bca00bc5297e17e5aad15f01c0478e351a00391 link-grammar-devel-4.2.5-1.fc8.ppc.rpm e6c5a6e9e7149ec1f3ed2c9b32d4d4c55ee76ffc link-grammar-debuginfo-4.2.5-1.fc8.ppc.rpm 29a6fb4ef761b8ffa69d508b92f96d93c3d87642 link-grammar-4.2.5-1.fc8.src.rpm This update can be installed with the yum update program. Use su -c 'yum update link-grammar' at the command line. For more information, refer to Managing Software with yum, available at http://docs.fedoraproject.org/yum/. Solution: Apply the appropriate updates. http://www.securityspace.com/smysecure/catid.html?in=FEDORA-2007-3235 Risk factor : Critical CVSS Score: 10.0 |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2007-5395 BugTraq ID: 26365 http://www.securityfocus.com/bid/26365 Bugtraq: 20071107 Secunia Research: AbiWord Link Grammar "separate_sentence()"Buffer Overflow (Google Search) http://www.securityfocus.com/archive/1/483370/100/0/threaded Bugtraq: 20071107 Secunia Research: Link Grammar "separate_sentence()" BufferOverflow (Google Search) http://www.securityfocus.com/archive/1/483368/100/0/threaded Debian Security Information: DSA-1432 (Google Search) http://www.debian.org/security/2007/dsa-1432 https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00411.html http://security.gentoo.org/glsa/glsa-200711-27.xml http://secunia.com/secunia_research/2007-78/advisory/ http://secunia.com/secunia_research/2007-79/advisory/ http://secunia.com/advisories/27300 http://secunia.com/advisories/27340 http://secunia.com/advisories/27631 http://secunia.com/advisories/27702 http://secunia.com/advisories/27783 http://secunia.com/advisories/28101 http://www.ubuntu.com/usn/usn-545-1 http://www.vupen.com/english/advisories/2007/3770 http://www.vupen.com/english/advisories/2007/3771 XForce ISS Database: abiword-linkgrammar-sentence-bo(38317) https://exchange.xforce.ibmcloud.com/vulnerabilities/38317 |
Copyright | Copyright (c) 2007 E-Soft Inc. http://www.securityspace.com |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |