Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Fedora Local Security Checks >> Fedora Core 2 2005-202: grip


Vulnerability Assessment Details

Fedora Core 2 2005-202: grip

Vulnerability Assessment Summary
Check for the version of the grip package

Detailed Explanation for this Vulnerability Assessment

The remote host is missing the patch for the advisory FEDORA-2005-202 (grip).

Grip is a GTK+ based front-end for CD rippers (such as cdparanoia and
cdda2wav) and Ogg Vorbis encoders. Grip permits you to rip entire tracks or
just a section of a track. Grip supports the CDDB protocol for
accessing track information on disc database servers.

Update Information:

This fixes a buffer overflow when the CDDB server returns more than 16
matches.


Solution : Get the newest Fedora Updates
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2005 Tenable Network Security

Cables, Connectors

HP SAS9212-4i 6Gb/s PCI-Express x8 SATA/SAS RAID Controller Card 636705-001 +Cbl
$74.96
HP SAS9212-4i 6Gb/s PCI-Express x8 SATA/SAS RAID Controller Card 636705-001 +Cbl pictureIBM pSeries 5703 Dual Channel Ultra320 SCSI RAID Controller PCI-X - 97P6516
$23.89
IBM pSeries 5703 Dual Channel Ultra320 SCSI RAID Controller PCI-X - 97P6516 pictureDell PowerEdge R330 E3-1220 v5 XEON 3.00GHz 4GB SAS RAID 1TB 1U Compact Server
$844.17
Dell PowerEdge R330 E3-1220 v5 XEON 3.00GHz 4GB SAS RAID 1TB 1U Compact Server pictureMicrosoft Windows Server 2016 Essentials Raid 1 Office Business -25 Users (G16)
$1249.0
Microsoft Windows Server 2016 Essentials Raid 1 Office Business -25 Users  (G16) picture


Discussions

No Discussions have been posted on this vulnerability.