Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Debian Local Security Checks >> [DSA714] DSA-714-1 kdelibs


Vulnerability Assessment Details

[DSA714] DSA-714-1 kdelibs

Vulnerability Assessment Summary
DSA-714-1 kdelibs

Detailed Explanation for this Vulnerability Assessment

KDE security team discovered several vulnerabilities in the PCX and
other image file format readers in the KDE core libraries, some of
them exploitable to execute arbitrary code. To a small extent the
packages in woody are affected as well.
For the stable distribution (woody) this problem has been fixed in
version 2.2.2-13.woody.14.
For the unstable distribution (sid) this problem has been fixed in
version 3.3.2-5.
We recommend that you upgrade your kdelibs packages.


Solution : http://www.debian.org/security/2005/dsa-714
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is (C) 2005 Michel Arboi

Cables, Connectors

Raspberry PI Game Servers 11 in 1 Multi-Boot For The RaspberryPi 0/1/2/3
$5.5
Raspberry PI  Game Servers 11 in 1 Multi-Boot For The RaspberryPi 0/1/2/3 pictureHF5111A Serial Linux Server RS232/RS485/RS422 Ethernet RJ45 Network Module
$55.9
HF5111A Serial Linux Server RS232/RS485/RS422 Ethernet RJ45 Network Module pictureDell PowerEdge R610 Rack Server 2x Xeon CPU 64GB RAM 2x300GB HDD Linux
$349.99
Dell PowerEdge R610 Rack Server 2x Xeon CPU 64GB RAM 2x300GB HDD Linux pictureDell PowerEdge R610 Rack Server 2x Intel Xeon CPU 64GB RAM 2x300GB HDD Linux
$329.99
Dell PowerEdge R610 Rack Server 2x Intel Xeon CPU 64GB RAM 2x300GB HDD Linux picture


Discussions

No Discussions have been posted on this vulnerability.