Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Debian Local Security Checks >> [DSA832] DSA-832-1 gopher


Vulnerability Assessment Details

[DSA832] DSA-832-1 gopher

Vulnerability Assessment Summary
DSA-832-1 gopher

Detailed Explanation for this Vulnerability Assessment

Several buffer overflows have been discovered in gopher, a
text-oriented client for the Gopher Distributed Hypertext protocol,
that can be exploited by a malicious Gopher server.
For the old stable distribution (woody) this problem has been fixed in
version 3.0.3woody4.
For the stable distribution (sarge) this problem has been fixed in
version 3.0.7sarge2.
For the unstable distribution (sid) this problem has been fixed in
version 3.0.11.
We recommend that you upgrade your gopher package.


Solution : http://www.debian.org/security/2005/dsa-832
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is (C) 2007 Michel Arboi

Cables, Connectors

Juniper SRX3600 Services Gateway *Loaded with cards, check description*
$5500.0
Juniper SRX3600 Services Gateway *Loaded with cards, check description* pictureUTT ER4240G Business Gigabit Router 4 WAN ports, 4 LAN Ports, Load VPN,Firewall
$248.28
UTT ER4240G Business Gigabit Router 4 WAN ports, 4 LAN Ports, Load VPN,Firewall pictureWatchguard Firebox T10 - 3 Ports - 10MB LAN, 100MB LAN, GigE WGT10000-US
$270.44
Watchguard Firebox T10 - 3 Ports - 10MB LAN, 100MB LAN, GigE WGT10000-US pictureCisco ASA 5505 Series Adaptive Security Firewall Appliance
$43.99
Cisco ASA 5505 Series Adaptive Security Firewall Appliance picture


Discussions

No Discussions have been posted on this vulnerability.