Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Debian Local Security Checks >> [DSA217] DSA-217-1 typespeed


Vulnerability Assessment Details

[DSA217] DSA-217-1 typespeed

Vulnerability Assessment Summary
DSA-217-1 typespeed

Detailed Explanation for this Vulnerability Assessment

A problem has been discovered in the typespeed, a game that lets you
measure your typematic speed. By overflowing a buffer a local
attacker could execute arbitrary commands under the group id games.
For the current stable distribution (woody) this problem has been
fixed in version 0.4.1-2.1.
For the old stable distribution (potato) this problem has been fixed
in version 0.4.0-5.1.
For the unstable distribution (sid) this problem has been fixed in
version 0.4.2-2.
We recommend that you upgrade your typespeed package.


Solution : http://www.debian.org/security/2002/dsa-217
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is (C) 2005 Michel Arboi

Cables, Connectors

StarTech USB 2.0 Print Server 10/100 MBPs PM1115U PC Mac Linux NEW
$20.0
StarTech USB 2.0 Print Server 10/100 MBPs PM1115U PC Mac Linux NEW pictureiDRAC7 Enterprise License for Dell 12th Gen Server
$60.0
iDRAC7 Enterprise License for Dell 12th Gen Server pictureUbuntu 18.04.1, 16.04.5 or 14.04.5 LTS│Linux│USB│Desktop or Server│32/64bit
$10.2
Ubuntu 18.04.1, 16.04.5 or 14.04.5 LTS│Linux│USB│Desktop or Server│32/64bit pictureUbuntu 18.04.1, 16.04.5 or 14.04.5 LTS│Linux│USB│Desktop or Server│32/64bit
$10.2
Ubuntu 18.04.1, 16.04.5 or 14.04.5 LTS│Linux│USB│Desktop or Server│32/64bit picture


Discussions

No Discussions have been posted on this vulnerability.