Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Debian Local Security Checks >> [DSA1122] DSA-1122-1 libnet-server-perl


Vulnerability Assessment Details

[DSA1122] DSA-1122-1 libnet-server-perl

Vulnerability Assessment Summary
DSA-1122-1 libnet-server-perl

Detailed Explanation for this Vulnerability Assessment

Peter Bieringer discovered that the "log" function in the Net::Server
Perl module, an extensible, general perl server engine, is not safe
against format string exploits.
The old stable distribution (woody) does not contain this package.
For the stable distribution (sarge) this problem has been fixed in
version 0.87-3sarge1.
For the unstable distribution (sid) this problem has been fixed in
version 0.89-1.
We recommend that you upgrade your libnet-server-perl package.


Solution : http://www.debian.org/security/2006/dsa-1122
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is (C) 2007 Michel Arboi

Cables, Connectors

SonicWall TZ300 (01-ssc-0581) 1yr CGSS - Sealed inside, but can't register-READ
$235.0
SonicWall TZ300 (01-ssc-0581) 1yr CGSS - Sealed inside, but can't register-READ pictureCisco Pix 506e Firewall Security Appliance UNTESTED
$15.0
Cisco Pix 506e Firewall Security Appliance UNTESTED pictureSonicWall TZ400 Firewall Appliance With Power Supply - No registration possible
$1.0
SonicWall TZ400 Firewall Appliance  With Power Supply - No registration possible pictureBlueCoat AV1400-A - AX400 Series Security Appliance NEW Open Box
$1495.0
BlueCoat AV1400-A  - AX400 Series Security Appliance NEW Open Box  picture


Discussions

No Discussions have been posted on this vulnerability.