Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.819399
Category:Fedora Local Security Checks
Title:Fedora: Security Advisory for medusa (FEDORA-2021-ac23d9e47f)
Summary:The remote host is missing an update for the 'medusa'; package(s) announced via the FEDORA-2021-ac23d9e47f advisory.
Description:Summary:
The remote host is missing an update for the 'medusa'
package(s) announced via the FEDORA-2021-ac23d9e47f advisory.

Vulnerability Insight:
Medusa is a speedy, massively parallel, modular,
login brute-forcer for network services.
Some of the key features of Medusa are:

* Thread-based parallel testing. Brute-force
testing can be performed against multiple hosts,
users or passwords concurrently.

* Flexible user input. Target information
(host/user/password) can be specified in a variety of ways.
For example, each item can be either a single
entry or a file containing multiple entries.
Additionally, a combination file format allows
the user to refine their target listing.

* Modular design. Each service module exists
as an independent .mod file.
This means that no modifications are necessary
to the core application in order to extend
the supported list of services for brute-forcing.

Affected Software/OS:
'medusa' package(s) on Fedora 33.

Solution:
Please install the updated package(s).

CVSS Score:
6.8

CVSS Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2021-41160
https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-7c9r-6r2q-93qg
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DWJXQOWKNR7O5HM2HFJOM4GBUFPTE3RG/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZXCR73EDVPLI6TRWRAWJCJ7OBYDKBB74/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WIZUPVRGCWUDAPDOQVUGUIYUO7UWKMXX/
https://security.gentoo.org/glsa/202210-24
https://lists.debian.org/debian-lts-announce/2023/11/msg00010.html
CopyrightCopyright (C) 2021 Greenbone Networks GmbH

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.