|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> Debian Local Security Checks >> [DSA649] DSA-649-1 xtrlock Vulnerability Assessment Details
|
[DSA649] DSA-649-1 xtrlock |
||
DSA-649-1 xtrlock Detailed Explanation for this Vulnerability Assessment A buffer overflow has been discovered in xtrlock, a minimal X display lock program which can be exploited by a malicious local attacker to crash the lock program and take over the desktop session. For the stable distribution (woody) this problem has been fixed in version 2.0-6woody2. For the unstable distribution (sid) this problem has been fixed in version 2.0-9. We recommend that you upgrade your xtrlock package. Solution : http://www.debian.org/security/2005/dsa-649 Network Security Threat Level: High Networks Security ID: Vulnerability Assessment Copyright: This script is (C) 2005 Michel Arboi |
||
Cables, Connectors |
Vintage 5362 IBM System/36 Mini-Computer Mainframe 5291 2, CRT Terminal DM12N501
$349.99
IBM Type 4869 External 5 1/4in Floppy Disk Drive Mainframe Collection - UNTESTED
$75.00
Vintage Hewlett Packard HP 2100S Microprogrammable Computer System Mainframe #2
$1499.99
Rare Vintage Texas Instruments Silent 700 Data Terminal + phone hookup
$145.00
$150.00
National Semiconductor SC/MP Low Cost Development System w/ Cards Manuals
$975.00
NOS Vintage CRAY X-MP SCALE MODEL Supercomputer Black Brown
$347.60
Vintage Apple Mac Macintosh 512K Case & Working CRT Only Chasis Mainframe
$99.99
Sage MAS 90 Software for Windows Financial Reporting Mainframe Collection
$360.99
NCR Mechanical Keyboard USB Wired 01027100 Beige Mainframe Collection
$290.99
|
||
No Discussions have been posted on this vulnerability. |