Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Debian Local Security Checks >> [DSA1228] DSA-1228-1 elinks


Vulnerability Assessment Details

[DSA1228] DSA-1228-1 elinks

Vulnerability Assessment Summary
DSA-1228-1 elinks

Detailed Explanation for this Vulnerability Assessment

Teemu Salmela discovered that the elinks character mode web browser
performs insufficient sanitising of smb:// URIs, which might lead to the
execution of arbitrary shell commands.
For the stable distribution (sarge) this problem has been fixed in
version 0.10.4-7.1.
For the upcoming stable distribution (etch) this problem has been
fixed in version 0.11.1-1.2.
For the unstable distribution (sid) this problem has been fixed in
version 0.11.1-1.2.
We recommend that you upgrade your elinks package.


Solution : http://www.debian.org/security/2006/dsa-1228
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is (C) 2007 Michel Arboi

Cables, Connectors

NEW - IBM Server Hardware PCI Riser Card for xSeries x3755 M3 Server - 69Y4920
$23.34
NEW - IBM Server Hardware PCI Riser Card for xSeries x3755 M3 Server - 69Y4920 pictureIBM iDataplex 2x DX360 M4 Node 4x 8C E5-2660 2.2GHz 96GB 4x73GB SAS M5014 2xPSU
$899.0
IBM iDataplex 2x DX360 M4 Node 4x 8C E5-2660 2.2GHz 96GB 4x73GB SAS M5014 2xPSU pictureServer memory Kingston 1GB 2RX8 DIMM PC2 5300F DDR2 667 KVR667D2D8F5/1G
$3.69
Server memory Kingston 1GB 2RX8 DIMM PC2 5300F DDR2 667 KVR667D2D8F5/1G pictureServer memory 256MB DDR, DDR1, 266, CL2, ECC, REG. Used, got from working unit
$0.99
Server memory 256MB DDR, DDR1, 266, CL2, ECC, REG. Used, got from working unit picture


Discussions

No Discussions have been posted on this vulnerability.