![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.63795 |
Category: | Debian Local Security Checks |
Title: | Debian: Security Advisory (DSA-1768-1) |
Summary: | The remote host is missing an update for the Debian 'openafs' package(s) announced via the DSA-1768-1 advisory. |
Description: | Summary: The remote host is missing an update for the Debian 'openafs' package(s) announced via the DSA-1768-1 advisory. Vulnerability Insight: Two vulnerabilities were discovered in the client part of OpenAFS, a distributed file system. CVE-2009-1251 An attacker with control of a file server or the ability to forge RX packets may be able to execute arbitrary code in kernel mode on an OpenAFS client, due to a vulnerability in XDR array decoding. CVE-2009-1250 An attacker with control of a file server or the ability to forge RX packets may crash OpenAFS clients because of wrongly handled error return codes in the kernel module. Note that in order to apply this security update, you must rebuild the OpenAFS kernel module. Be sure to also upgrade openafs-modules-source, build a new kernel module for your system following the instructions in /usr/share/doc/openafs-client/README.modules.gz, and then either stop and restart openafs-client or reboot the system to reload the kernel module. For the old stable distribution (etch), these problems have been fixed in version 1.4.2-6etch2. For the stable distribution (lenny), these problems have been fixed in version 1.4.7.dfsg1-6+lenny1. For the unstable distribution (sid), these problems have been fixed in version 1.4.10+dfsg1-1. We recommend that you upgrade your openafs packages. Affected Software/OS: 'openafs' package(s) on Debian 4, Debian 5. Solution: Please install the updated package(s). CVSS Score: 10.0 CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2009-1250 AIX APAR: ID71123 http://www-1.ibm.com/support/docview.wss?uid=swg1ID71123 BugTraq ID: 34404 http://www.securityfocus.com/bid/34404 Debian Security Information: DSA-1768 (Google Search) http://www.debian.org/security/2009/dsa-1768 http://security.gentoo.org/glsa/glsa-201101-05.xml http://www.mandriva.com/security/advisories?name=MDVSA-2009:099 http://secunia.com/advisories/34655 http://secunia.com/advisories/34684 http://secunia.com/advisories/36310 http://secunia.com/advisories/42896 http://www.vupen.com/english/advisories/2009/0984 http://www.vupen.com/english/advisories/2011/0117 Common Vulnerability Exposure (CVE) ID: CVE-2009-1251 BugTraq ID: 34407 http://www.securityfocus.com/bid/34407 |
Copyright | Copyright (C) 2009 Greenbone AG |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |