|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> Debian Local Security Checks >> [DSA575] DSA-575-1 catdoc Vulnerability Assessment Details
|
[DSA575] DSA-575-1 catdoc |
||
DSA-575-1 catdoc Detailed Explanation for this Vulnerability Assessment A temporary file problem has been discovered in xlsview from the catdoc suite, convertors from Word to TeX and plain text, which could lead to local users being able to overwrite arbitrary files via a symlink attack on predictable temporary file names. For the stable distribution (woody) this problem has been fixed in version 0.91.5-1.woody3. For the unstable distribution (sid) this problem has been fixed in version 0.91.5-2. We recommend that you upgrade your catdoc package. Solution : http://www.debian.org/security/2004/dsa-575 Network Security Threat Level: High Networks Security ID: Vulnerability Assessment Copyright: This script is (C) 2005 Michel Arboi |
||
Cables, Connectors |
AUDIO CODES MP-114 VOIP Gateway Open Box
$37.49
Polycom VVX 450 Business IP Phone - VoIP phone P/N: 2200-48840-025
$49.99
Cisco CP-8832-K9 Unified 8800 Series Conference VOIP IP Phone 1 Year Warranty
$139.00
$157.36
Cisco CP-7945G VOIP Phone With Stand & Handset Business IP Phone 7945
$3.00
New Cisco 7945G IP VoIP Gigabit GIGE Telephone Phone CP-7945G -
$24.95
Grandstream GS-HT802 2 Port Analog Telephone Adapter VoIP Phone & Device, Black
$32.00
Cisco 8841 CP-8841-K9 VoIP Business IP Phone (Charcoal)
$50.00
Algo 8301 PoE IP Voice Paging Adapter with Audio Streaming and Bell Scheduler
$209.25
Polycom VVX400 Color Display IP VoIP Business Desk Phone 2201-46104-001 NEW
$79.99
|
||
No Discussions have been posted on this vulnerability. |