Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Fedora Local Security Checks >> Fedora Core 1 2004-078: pwlib


Vulnerability Assessment Details

Fedora Core 1 2004-078: pwlib

Vulnerability Assessment Summary
Check for the version of the pwlib package

Detailed Explanation for this Vulnerability Assessment

The remote host is missing the patch for the advisory FEDORA-2004-078 (pwlib).


PWLib is a cross-platform class library designed to support the OpenH323
project. OpenH323 provides an implementation of the ITU H.323
teleconferencing protocol, used by packages such as Gnome Meeting.

Update Information:

A test suite for the H.225 protocol (part of the H.323 family) provided
by the NISCC uncovered bugs in PWLib prior to version 1.6.0. An
attacker could trigger these bugs by sending carefully crafted messages
to an application. The effects of such an attack can vary depending on
the application, but would usually result in a Denial of Service. The
Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the name CVE-2004-0097 to this issue.

Users are advised to upgrade to the update packages, which contain
backported security fixes and are not vulnerable to these issues.

Red Hat would like to thank Craig Southeren of the OpenH323 project for
providing the fixes for these issues.



Solution : http://www.fedoranews.org/updates/FEDORA-2004-078.shtml
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security

Cables, Connectors

IBM 90Y9072 IBM.Processor Xeon E5 Intel Xeon Processor E5-4650 (20M Cache, 2.70
$726.0
IBM 90Y9072 IBM.Processor Xeon E5 Intel Xeon Processor E5-4650 (20M Cache, 2.70 pictureIntel SR0KM Intel.Processor Xeon E5 Six-Core 2.00 GHz Bus Speed: 7.20 GT/s LGA20
$196.0
Intel SR0KM Intel.Processor Xeon E5 Six-Core 2.00 GHz Bus Speed: 7.20 GT/s LGA20 pictureIntel SLG9G Intel.Processor Xeon Quad-Core 2.13 GHz Bus Speed: 1066 MHz Socket 6
$52.0
Intel SLG9G Intel.Processor Xeon Quad-Core 2.13 GHz Bus Speed: 1066 MHz Socket 6 pictureIntel SLC3J Intel.Processor Xeon Eight-Core 2.13 GHz Bus Speed: 6.40 GT/s LGA156
$168.0
Intel SLC3J Intel.Processor Xeon Eight-Core 2.13 GHz Bus Speed: 6.40 GT/s LGA156 picture


Discussions

No Discussions have been posted on this vulnerability.