Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Fedora Local Security Checks >> Fedora Core 6 2006-1278: elinks


Vulnerability Assessment Details

Fedora Core 6 2006-1278: elinks

Vulnerability Assessment Summary
Check for the version of the elinks package

Detailed Explanation for this Vulnerability Assessment

The remote host is missing the patch for the advisory FEDORA-2006-1278 (elinks).

Links is a text-based Web browser. Links does not display any images,
but it does support frames, tables and most other HTML tags. Links'
advantage over graphical browsers is its speed--Links starts and exits
quickly and swiftly displays Web pages.



Update information :

* Tue Nov 21 2006 Karel Zak 0.11.1-5.1
- fix #215734: CVE-2006-5925 elinks smb protocol arbitrary file access


Solution : Get the newest Fedora Updates
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2007 Tenable Network Security

Cables, Connectors

DELL POWEREDGE R810 SERVER TWO E7-4820 2.0GHZ 256GB 2 X 300GB 15K SAS
$3429.0
DELL POWEREDGE R810 SERVER TWO E7-4820 2.0GHZ 256GB 2 X 300GB 15K SAS pictureDELL POWEREDGE R810 SERVER FOUR E7520 1.86GHZ 64GB 1TB SATA
$2959.0
DELL POWEREDGE R810 SERVER FOUR E7520 1.86GHZ 64GB 1TB SATA pictureDELL POWEREDGE R610 SERVER TWO X5647 2.93GHZ 48GB 4 X 300GB 15K SAS PERC 6/I
$5949.0
DELL POWEREDGE R610 SERVER TWO X5647 2.93GHZ 48GB 4 X 300GB 15K SAS PERC 6/I pictureDELL POWEREDGE R810 SERVER FOUR E7-8870 2.40GHZ 64GB 2 X 250GB SATA
$2989.0
DELL POWEREDGE R810 SERVER FOUR E7-8870 2.40GHZ 64GB 2 X 250GB SATA picture


Discussions

No Discussions have been posted on this vulnerability.