Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Debian Local Security Checks >> [DSA1023] DSA-1023-1 kaffeine


Vulnerability Assessment Details

[DSA1023] DSA-1023-1 kaffeine

Vulnerability Assessment Summary
DSA-1023-1 kaffeine

Detailed Explanation for this Vulnerability Assessment

Marcus Meissner discovered that kaffeine, a versatile media player for
KDE 3, contains an unchecked buffer that can be overwritten remotely
when fetching remote RAM playlists which can cause the execution of
arbitrary code.
The old stable distribution (woody) does not contain kaffeine packages.
For the stable distribution (sarge) this problem has been fixed in
version 0.6-1sarge1.
For the unstable distribution (sid) this problem will be fixed soon.
We recommend that you upgrade your kaffeine package.


Solution : http://www.debian.org/security/2006/dsa-1023
Network Security Threat Level: High

Networks Security ID: 17372

Vulnerability Assessment Copyright: This script is (C) 2006 Michel Arboi

Cables, Connectors

Inateck USB 3.0 External Hard Drive Enclosure Case for 2.5" SATA HDD /SSD /UASP
$10.99
Inateck USB 3.0 External Hard Drive Enclosure Case for 2.5Glyph Technologies StudioRAID mini 1TB (2x 500GB) External Solid State Drive
$389.95
Glyph Technologies StudioRAID mini 1TB (2x 500GB) External Solid State Drive pictureIntel DC S3610 Series SSDSC2BX400G4 400GB 2.5 inch SATA3 Solid State Drive (MLC)
$471.19
Intel DC S3610 Series SSDSC2BX400G4 400GB 2.5 inch SATA3 Solid State Drive (MLC) pictureTranscend 256GB MLC SATA III 6Gb/s 2.5" Solid State Drive 370 (TS256GSSD370S) &
$149.96
Transcend 256GB MLC SATA III 6Gb/s 2.5


Discussions

No Discussions have been posted on this vulnerability.