Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Fedora Local Security Checks >> Fedora Core 3 2005-203: grip


Vulnerability Assessment Details

Fedora Core 3 2005-203: grip

Vulnerability Assessment Summary
Check for the version of the grip package

Detailed Explanation for this Vulnerability Assessment

The remote host is missing the patch for the advisory FEDORA-2005-203 (grip).

Grip is a GTK+ based front-end for CD rippers (such as cdparanoia and
cdda2wav) and Ogg Vorbis encoders. Grip permits you to rip entire tracks or
just a section of a track. Grip supports the CDDB protocol for
accessing track information on disc database servers.

Update Information:

This fixes a buffer overflow when the CDDB server returns more than 16
matches.


Solution : Get the newest Fedora Updates
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2005 Tenable Network Security

Cables, Connectors

USB Video Capture Converter Analog to Digital VHS VCR TV to PC Computer Laptop
$22.42
USB Video Capture Converter Analog to Digital VHS VCR TV to PC Computer Laptop pictureConverter USB Video Capture Analog to Digital VHS VCR TV to PC Computer Laptop
$16.78
Converter USB Video Capture Analog to Digital VHS VCR TV to PC Computer Laptop pictureAPC by Schneider Electric KVM 2G, Analog, 1 Local User, 16 ports - 16 Computer(s
$560.11
APC by Schneider Electric KVM 2G, Analog, 1 Local User, 16 ports - 16 Computer(s pictureVintage Apple Computer Duodisk Analog Card 820-0147 676-0107
$19.99
Vintage Apple Computer Duodisk Analog Card 820-0147 676-0107 picture


Discussions

No Discussions have been posted on this vulnerability.