Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Debian Local Security Checks >> [DSA1170] DSA-1170-1 gcc-3.4


Vulnerability Assessment Details

[DSA1170] DSA-1170-1 gcc-3.4

Vulnerability Assessment Summary
DSA-1170-1 gcc-3.4

Detailed Explanation for this Vulnerability Assessment

Jürgen Weigert discovered that upon unpacking JAR archives fastjar
from the GNU Compiler Collection does not check the path for included
files and permits to create or overwrite files in upper directories.
For the stable distribution (sarge) this problem has been fixed in
version 3.4.3-13sarge1.
For the unstable distribution (sid) this problem has been fixed in
version 4.1.1-11.
We recommend that you upgrade your fastjar package.


Solution : http://www.debian.org/security/2006/dsa-1170
Network Security Threat Level: High

Networks Security ID: 15669

Vulnerability Assessment Copyright: This script is (C) 2007 Michel Arboi

Cables, Connectors

HP Zbook 15 Intel Core i7-6820HQ 2.7GHz CPU Pre-Production Laptop Notebook AS-IS
$100.0
HP Zbook 15 Intel Core i7-6820HQ 2.7GHz CPU Pre-Production Laptop Notebook AS-IS pictureIntel Core i7-870 SLBJG 2.93GHz Quad Core LGA 1156 CPU Processor
$48.0
Intel Core i7-870 SLBJG 2.93GHz Quad Core LGA 1156  CPU Processor pictureHP 17-X028CY Intel Pentium N3710 CPU-1.6GHz, 4GB 1TB 17" LCD Windows 10 White
$269.99
HP 17-X028CY Intel Pentium N3710 CPU-1.6GHz, 4GB  1TB 17Intel Core i3-8100 Coffee Lake Processor 3.6GHz 8.0GT/s 6MB LGA 1151 CPU
$46.61
Intel Core i3-8100 Coffee Lake Processor 3.6GHz 8.0GT/s 6MB LGA 1151 CPU picture


Discussions

No Discussions have been posted on this vulnerability.