|Category:||Mandrake Local Security Checks|
|Title:||Mandriva Security Advisory MDVSA-2009:107-1 (acpid)|
|Summary:||Mandriva Security Advisory MDVSA-2009:107-1 (acpid)|
The remote host is missing an update to acpid
announced via advisory MDVSA-2009:107-1.
The daemon in acpid before 1.0.10 allows remote attackers to cause a
denial of service (CPU consumption and connectivity loss) by opening
a large number of UNIX sockets without closing them, which triggers
an infinite loop (CVE-2009-0798).
The updated packages have been patched to prevent this.
Packages for 2008.0 are being provided due to extended support for
To upgrade automatically use MandrakeUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
Common Vulnerability Exposure (CVE) ID: CVE-2009-0798|
Debian Security Information: DSA-1786 (Google Search)
BugTraq ID: 34692
XForce ISS Database: acpid-socket-dos(50060)
|Copyright||Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com|
|This is only one of 58962 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.