Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Debian Local Security Checks >> [DSA1170] DSA-1170-1 gcc-3.4


Vulnerability Assessment Details

[DSA1170] DSA-1170-1 gcc-3.4

Vulnerability Assessment Summary
DSA-1170-1 gcc-3.4

Detailed Explanation for this Vulnerability Assessment

Jürgen Weigert discovered that upon unpacking JAR archives fastjar
from the GNU Compiler Collection does not check the path for included
files and permits to create or overwrite files in upper directories.
For the stable distribution (sarge) this problem has been fixed in
version 3.4.3-13sarge1.
For the unstable distribution (sid) this problem has been fixed in
version 4.1.1-11.
We recommend that you upgrade your fastjar package.


Solution : http://www.debian.org/security/2006/dsa-1170
Network Security Threat Level: High

Networks Security ID: 15669

Vulnerability Assessment Copyright: This script is (C) 2007 Michel Arboi

Cables, Connectors

Server RAM 32GB 8x 4GB PC3-10600R ECC REG DDR3 1333 2Rx4 Memory FIT Dell HP IBM
$79.95
Server RAM 32GB 8x 4GB PC3-10600R ECC REG DDR3 1333 2Rx4 Memory FIT Dell HP IBM pictureServer RAM 32GB 8x 4GB PC3-10600R ECC REG DDR3 1333 2Rx4 Memory FIT Dell HP IBM
$79.95
Server RAM 32GB 8x 4GB PC3-10600R ECC REG DDR3 1333 2Rx4 Memory FIT Dell HP IBM pictureIBM X3550 M3 1U Server - Intel Xeon E5506 4-Core @ 2.13GHz 2GB RAM 2.5" Bays ]]
$84.05
IBM X3550 M3 1U Server - Intel Xeon E5506 4-Core @ 2.13GHz 2GB RAM 2.5IBM 8406-71Y Blade PS702: 2x Power7 3.3GHz 46J6699 - 256GB - 2x 300GB - QMI2582
$519.39
IBM 8406-71Y Blade PS702: 2x Power7 3.3GHz 46J6699 - 256GB - 2x 300GB - QMI2582 picture


Discussions

No Discussions have been posted on this vulnerability.