Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Debian Local Security Checks >> [DSA595] DSA-595-1 bnc


Vulnerability Assessment Details

[DSA595] DSA-595-1 bnc

Vulnerability Assessment Summary
DSA-595-1 bnc

Detailed Explanation for this Vulnerability Assessment

Leon Juranic discovered that BNC, an IRC session bouncing proxy, does
not always protect buffers from being overwritten. This could
exploited by a malicious IRC server to overflow a buffer of limited
size and execute arbitrary code on the client host.
For the stable distribution (woody) this problem has been fixed in
version 2.6.4-3.3.
This package does not exist in the testing or unstable distributions.
We recommend that you upgrade your bnc package.


Solution : http://www.debian.org/security/2004/dsa-595
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is (C) 2005 Michel Arboi

Cables, Connectors

XYRATEX 92883-01 92939-02 63011-02 IBM / SUPER MICRO SERVER BACK PLANE
$139.99
XYRATEX 92883-01 92939-02 63011-02 IBM / SUPER MICRO SERVER BACK PLANE pictureHP GG795AA MediaSmart Server Micro Tower EX470
$29.95
HP GG795AA MediaSmart Server Micro Tower EX470 pictureKingston 8GB PC3L-10600E ECC UDIMM DDR3 Memory KTH-PL313E/8G Microserver Gen8
$61.14
Kingston 8GB PC3L-10600E ECC UDIMM DDR3 Memory KTH-PL313E/8G Microserver Gen8 pictureSupermicro X10SLQ Micro ATX Server Motherboard w/ Intel Chipset & Socket H3
$175.07
Supermicro X10SLQ Micro ATX Server Motherboard w/ Intel Chipset & Socket H3 picture


Discussions

No Discussions have been posted on this vulnerability.