Vulnerability Assessment & Network Security Forums

If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.

Home >> Browse Vulnerability Assessment Database >> Debian Local Security Checks >> [DSA368] DSA-368-1 xpcd

Vulnerability Assessment Details

[DSA368] DSA-368-1 xpcd

Vulnerability Assessment Summary
DSA-368-1 xpcd

Detailed Explanation for this Vulnerability Assessment

Steve Kemp discovered a buffer overflow in xpcd-svga which can be
triggered by a long HOME environment variable. This vulnerability
could be exploited by a local attacker to gain root rights.
For the stable distribution (woody) this problem has been fixed in
version 2.08-8woody1.
For the unstable distribution (sid) this problem will be fixed soon.
We recommend that you update your xpcd package.

Solution :
Network Security Threat Level: High

Networks Security ID: 8370

Vulnerability Assessment Copyright: This script is (C) 2005 Michel Arboi

Cables, Connectors

Cisco ASA5505 Firewall
Cisco ASA5505 Firewall picture0235A11L / JD269A HP 100-A VPN FIREWALL MODULE
0235A11L / JD269A  HP 100-A VPN FIREWALL MODULE pictureNetgear ProSafe VPN Firewall 25
Netgear ProSafe VPN Firewall 25 pictureCisco ASA5516-FPWR-K9 Asa 5516 X Firewall Appliance Networking Device
Cisco ASA5516-FPWR-K9 Asa 5516 X Firewall Appliance Networking Device picture


No Discussions have been posted on this vulnerability.