Vulnerability Assessment & Network Security Forums

If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.

Home >> Browse Vulnerability Assessment Database >> Debian Local Security Checks >> [DSA326] DSA-326-1 orville-write

Vulnerability Assessment Details

[DSA326] DSA-326-1 orville-write

Vulnerability Assessment Summary
DSA-326-1 orville-write

Detailed Explanation for this Vulnerability Assessment

Orville Write, a replacement for the standard write(1) command,
contains a number of buffer overflows. These could be exploited to
gain either gid tty or root rights, depending on the configuration
selected when the package is installed.
For the stable distribution (woody) this problem has been fixed in
version 2.53-4woody1.
The old stable distribution (potato) does not contain an orville-write
For the unstable distribution (sid) this problem will be fixed soon.
See Debian bug report #170747.
We recommend that you update your orville-write package.

Solution :
Network Security Threat Level: High

Networks Security ID: 7988

Vulnerability Assessment Copyright: This script is (C) 2005 Michel Arboi

Cables, Connectors

Atari 1040STF 1040 STF Computer Bedienungshandbuch
Atari 1040STF 1040 STF Computer Bedienungshandbuch pictureSubmarine Commander Atari 400 800 XL XE (cart only)
Submarine Commander Atari 400 800 XL XE (cart only) pictureEpyx Jumpman for Atari 400/800/XL
Epyx Jumpman for Atari 400/800/XL pictureAtari Computer 1010 Tape Deck Drive 1000E Modem ++
Atari Computer 1010 Tape Deck Drive 1000E Modem ++ picture


No Discussions have been posted on this vulnerability.