![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.702592 |
Category: | Debian Local Security Checks |
Title: | Debian: Security Advisory (DSA-2592-1) |
Summary: | The remote host is missing an update for the Debian 'elinks' package(s) announced via the DSA-2592-1 advisory. |
Description: | Summary: The remote host is missing an update for the Debian 'elinks' package(s) announced via the DSA-2592-1 advisory. Vulnerability Insight: Marko Myllynen discovered that ELinks, a powerful text-mode browser, incorrectly delegates user credentials during GSS-Negotiate. For the stable distribution (squeeze), this problem has been fixed in version 0.12~ pre5-2+squeeze1. Since the initial Squeeze release, XULRunner needed to be updated and the version currently in the archive is incompatible with ELinks. As such, JavaScript support needed to be disabled (only a small subset of typical functionality was supported anyway). It will likely be re-enabled in a later point update. For the testing distribution (wheezy), this problem has been fixed in version 0.12~ pre5-9. For the unstable distribution (sid), this problem has been fixed in version 0.12~ pre5-9. We recommend that you upgrade your elinks packages. Affected Software/OS: 'elinks' package(s) on Debian 6. Solution: Please install the updated package(s). CVSS Score: 5.1 CVSS Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2012-4545 51569 http://secunia.com/advisories/51569 57065 http://www.securityfocus.com/bid/57065 DSA-2592 http://www.debian.org/security/2012/dsa-2592 MDVSA-2013:075 http://www.mandriva.com/security/advisories?name=MDVSA-2013:075 RHSA-2013:0250 http://rhn.redhat.com/errata/RHSA-2013-0250.html elinks-httpnegotiate-security-bypass(80882) https://exchange.xforce.ibmcloud.com/vulnerabilities/80882 http://bugzilla.elinks.cz/show_bug.cgi?id=1124 http://repo.or.cz/w/elinks.git/blobdiff/89056e21fc7ab8e1c2d4e06ec9d0c6d01e70669a..da18694ff7dd0b67dfcb3c417fb0579b1e7d02d7:/src/protocol/http/http_negotiate.c |
Copyright | Copyright (C) 2013 Greenbone AG |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |