Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Fedora Local Security Checks >> Fedora Core 3 2005-203: grip


Vulnerability Assessment Details

Fedora Core 3 2005-203: grip

Vulnerability Assessment Summary
Check for the version of the grip package

Detailed Explanation for this Vulnerability Assessment

The remote host is missing the patch for the advisory FEDORA-2005-203 (grip).

Grip is a GTK+ based front-end for CD rippers (such as cdparanoia and
cdda2wav) and Ogg Vorbis encoders. Grip permits you to rip entire tracks or
just a section of a track. Grip supports the CDDB protocol for
accessing track information on disc database servers.

Update Information:

This fixes a buffer overflow when the CDDB server returns more than 16
matches.


Solution : Get the newest Fedora Updates
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2005 Tenable Network Security

Cables, Connectors

Dell PowerEdge R200 R300 SAS6/IR 6iR SATA Raid Controller Card JW063 RU422 NN113
$34.99
Dell PowerEdge R200 R300 SAS6/IR 6iR SATA Raid Controller Card JW063 RU422 NN113 pictureD90PG DELL PERC H800 512MB 6GB/S EXTERNAL SAS SATA RAID CONTROLLER
$140.0
D90PG DELL PERC H800 512MB 6GB/S EXTERNAL SAS SATA RAID CONTROLLER pictureB&R AUTOMATION PC APC 810 5PC810.SX01-00 with raid no HDD win7 pro COA Lot of 4
$1399.0
B&R AUTOMATION PC APC 810 5PC810.SX01-00 with raid no HDD win7 pro COA Lot of 4 pictureAdaptec ASR-2200S/64MB PCI U320 Dual Port SCSI RAID Controller
$1.0
Adaptec ASR-2200S/64MB PCI U320 Dual Port SCSI RAID Controller picture


Discussions

No Discussions have been posted on this vulnerability.