Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Debian Local Security Checks >> [DSA884] DSA-884-1 horde3


Vulnerability Assessment Details

[DSA884] DSA-884-1 horde3

Vulnerability Assessment Summary
DSA-884-1 horde3

Detailed Explanation for this Vulnerability Assessment

Mike O'Connor discovered that the default installation of Horde3 on
Debian includes an administrator account without a password. Already
configured installations will not be altered by this update.
The old stable distribution (woody) does not contain horde3 packages.
For the stable distribution (sarge) this problem has been fixed in
version 3.0.4-4sarge1.
For the unstable distribution (sid) this problem has been fixed in
version 3.0.5-2
We recommend that you verify your horde3 admin account if you have
installed Horde3.


Solution : http://www.debian.org/security/2005/dsa-884
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is (C) 2007 Michel Arboi

Cables, Connectors

USB Memory uDrive Data Storage IN One Box WiFi Disk Sans File Server Micro SD
$14.79
USB Memory uDrive Data Storage IN One Box WiFi Disk Sans File Server Micro SD pictureBlueArc Super MIcro Computer Inc. Super Server 5013G-M
$600.0
BlueArc Super MIcro Computer Inc. Super Server 5013G-M pictureLot of 2 HP Micro 8GB PC3L-10600R DDR3-1333MHz Server Memory HP 605313-071
$44.0
Lot of 2 HP Micro 8GB PC3L-10600R DDR3-1333MHz Server Memory HP 605313-071 pictureHP ProLiant G7 Dual-Core MicroServer 320 GB Hard Drive & 1.5 T HD
$139.5
HP ProLiant G7 Dual-Core MicroServer 320 GB Hard Drive & 1.5 T HD picture


Discussions

No Discussions have been posted on this vulnerability.