![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.63523 |
Category: | Mandrake Local Security Checks |
Title: | Mandrake Security Advisory MDVSA-2009:072 (perl-MDK-Common) |
Summary: | The remote host is missing an update to perl-MDK-Common;announced via advisory MDVSA-2009:072. |
Description: | Summary: The remote host is missing an update to perl-MDK-Common announced via advisory MDVSA-2009:072. Vulnerability Insight: Some vulnerabilities were discovered and corrected in perl-MDK-Common: The functions used to write strings into shell like configuration files by Mandriva tools were not taking care of some special characters. This could lead to some bugs (like wireless keys containing certain characters not working), and privilege escalation. This update fixes that issue by ensuring proper protection of strings. The updated packages have been patched to correct these issues. Affected: 2008.0, 2008.1, 2009.0, Corporate 3.0, Corporate 4.0, Multi Network Firewall 2.0 Solution: To upgrade automatically use MandrakeUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. CVSS Score: 7.2 CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2009-0912 BugTraq ID: 34089 http://www.securityfocus.com/bid/34089 http://www.mandriva.com/security/advisories?name=MDVSA-2009:072 http://www.vupen.com/english/advisories/2009/0688 XForce ISS Database: perlmdkcommon-unspecified-priv-escalation(49220) https://exchange.xforce.ibmcloud.com/vulnerabilities/49220 |
Copyright | Copyright (C) 2009 E-Soft Inc. |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |