Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Debian Local Security Checks >> [DSA595] DSA-595-1 bnc


Vulnerability Assessment Details

[DSA595] DSA-595-1 bnc

Vulnerability Assessment Summary
DSA-595-1 bnc

Detailed Explanation for this Vulnerability Assessment

Leon Juranic discovered that BNC, an IRC session bouncing proxy, does
not always protect buffers from being overwritten. This could
exploited by a malicious IRC server to overflow a buffer of limited
size and execute arbitrary code on the client host.
For the stable distribution (woody) this problem has been fixed in
version 2.6.4-3.3.
This package does not exist in the testing or unstable distributions.
We recommend that you upgrade your bnc package.


Solution : http://www.debian.org/security/2004/dsa-595
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is (C) 2005 Michel Arboi

Cables, Connectors

PERSONAL COMPUTING ON THE VIC-20 COMMODORE COMPUTER VINTAGE RETRO BOOK
$22.77
PERSONAL COMPUTING ON THE VIC-20 COMMODORE COMPUTER VINTAGE RETRO BOOK pictureMASTERING THE VIC-20 COMMODORE COMPUTER PETER VERNON VINTAGE RETRO BOOK
$22.77
MASTERING THE VIC-20 COMMODORE COMPUTER PETER VERNON VINTAGE RETRO BOOK pictureVolks 6420 with AutoCom IV Software - For use with the Commodore 64 Computer
$14.99
Volks 6420 with AutoCom IV Software - For use with the Commodore 64 Computer pictureCommodore PET Diet Planner & Biorythm w/ manual Cassette UNTESTED AS IS Vintage
$21.17
Commodore PET Diet Planner & Biorythm w/ manual Cassette UNTESTED AS IS Vintage picture


Discussions

No Discussions have been posted on this vulnerability.