![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.59870 |
Category: | Fedora Local Security Checks |
Title: | Fedora Core 7 FEDORA-2007-3339 (link-grammar) |
Summary: | NOSUMMARY |
Description: | Description: The remote host is missing an update to link-grammar announced via advisory FEDORA-2007-3339. A library that can perform grammar checking. Update Information: CVE-2007-5395 is fixed in this release ChangeLog: * Mon Nov 12 2007 Marc Maurer 4.2.5-1 - New upstream version, fixes bug 371221. References: [ 1 ] Bug #371221 - CVE-2007-5395 link-grammar buffer overflow in tokenize.c https://bugzilla.redhat.com/show_bug.cgi?id=371221 Updated packages: 34ae8c6bf6f45d9ce50694daa6c0761bd589de97 link-grammar-debuginfo-4.2.5-1.fc7.ppc64.rpm c3feb02b1d679ff8d65e6a8962a276dc41108e37 link-grammar-devel-4.2.5-1.fc7.ppc64.rpm 0875048bc733eaa8612c6aa12eeb02d70386b4eb link-grammar-4.2.5-1.fc7.ppc64.rpm bd2d0b0e2f10cf194787236a660605f19307fea0 link-grammar-debuginfo-4.2.5-1.fc7.i386.rpm 83aff35a2b3e9d76e1460aff70aad49fe1814280 link-grammar-4.2.5-1.fc7.i386.rpm c927f211d1cd5679f1815f7137765af320d1172b link-grammar-devel-4.2.5-1.fc7.i386.rpm 4f7ace323dd0f01d87692752dfc01b958588fb1d link-grammar-4.2.5-1.fc7.x86_64.rpm b60ad4a5d09a8f123de6f5eb3681785da425428c link-grammar-devel-4.2.5-1.fc7.x86_64.rpm 84c486eb1e991e1468ed9ef3eae637a19504a284 link-grammar-debuginfo-4.2.5-1.fc7.x86_64.rpm 92b96df32e56f1b09466fda2cce87367b3dac2b0 link-grammar-4.2.5-1.fc7.ppc.rpm df6b2cbd6b3cfb4d108765a770d2aae1094742d1 link-grammar-devel-4.2.5-1.fc7.ppc.rpm 654b391ee47b2aa8448a31b0cd0578f82e1385f8 link-grammar-debuginfo-4.2.5-1.fc7.ppc.rpm 8ef3f7da2218084e294f54941ad04854df6dc2b6 link-grammar-4.2.5-1.fc7.src.rpm This update can be installed with the yum update program. Use su -c 'yum update link-grammar' at the command line. For more information, refer to Managing Software with yum, available at http://docs.fedoraproject.org/yum/. Solution: Apply the appropriate updates. http://www.securityspace.com/smysecure/catid.html?in=FEDORA-2007-3339 Risk factor : Critical CVSS Score: 10.0 |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2007-5395 BugTraq ID: 26365 http://www.securityfocus.com/bid/26365 Bugtraq: 20071107 Secunia Research: AbiWord Link Grammar "separate_sentence()"Buffer Overflow (Google Search) http://www.securityfocus.com/archive/1/483370/100/0/threaded Bugtraq: 20071107 Secunia Research: Link Grammar "separate_sentence()" BufferOverflow (Google Search) http://www.securityfocus.com/archive/1/483368/100/0/threaded Debian Security Information: DSA-1432 (Google Search) http://www.debian.org/security/2007/dsa-1432 https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00411.html http://security.gentoo.org/glsa/glsa-200711-27.xml http://secunia.com/secunia_research/2007-78/advisory/ http://secunia.com/secunia_research/2007-79/advisory/ http://secunia.com/advisories/27300 http://secunia.com/advisories/27340 http://secunia.com/advisories/27631 http://secunia.com/advisories/27702 http://secunia.com/advisories/27783 http://secunia.com/advisories/28101 http://www.ubuntu.com/usn/usn-545-1 http://www.vupen.com/english/advisories/2007/3770 http://www.vupen.com/english/advisories/2007/3771 XForce ISS Database: abiword-linkgrammar-sentence-bo(38317) https://exchange.xforce.ibmcloud.com/vulnerabilities/38317 |
Copyright | Copyright (c) 2007 E-Soft Inc. http://www.securityspace.com |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |