Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> FreeBSD Local Security Checks >> FreeBSD : cups-base -- HPGL buffer overflow vulnerability (218)


Vulnerability Assessment Details

FreeBSD : cups-base -- HPGL buffer overflow vulnerability (218)

Vulnerability Assessment Summary
Check for cups-base

Detailed Explanation for this Vulnerability Assessment

The remote host is missing an update to the system

The following package is affected: cups-base

Solution : Update the package on the remote host
See also :


Networks Security ID: 11968

Vulnerability Assessment Copyright: This script is Copyright (C) 2006 Tenable Network Security

Cables, Connectors

Lenovo Broadcom NetXtreme II ML2 Dual Port 10GbE SFP+ For Lenovo System x - PCI
$414.88
Lenovo Broadcom NetXtreme II ML2 Dual Port 10GbE SFP+ For Lenovo System x - PCI  pictureCisco WS-C4948 Cisco Catalyst 4948, optnl sw, 48-Port 10/100/1000+4 SFP No PS
$170.0
Cisco WS-C4948  Cisco Catalyst 4948, optnl sw, 48-Port 10/100/1000+4 SFP No PS pictureCISCO NME-XD-48ES-2S-P Cisco EtherSwitch Service Mod 48 10/100T POE + 2SFP
$25.0
CISCO NME-XD-48ES-2S-P Cisco EtherSwitch Service Mod 48 10/100T POE + 2SFP pictureCISCO WS-C3750G-12S-SD Cisco Catalyst 3750 12 SFP DC powered Standard Multilayer
$1400.0
CISCO WS-C3750G-12S-SD Cisco Catalyst 3750 12 SFP DC powered Standard Multilayer picture


Discussions

No Discussions have been posted on this vulnerability.