Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Mandrake Local Security Checks >> MDKSA-2003:113: screen


Vulnerability Assessment Details

MDKSA-2003:113: screen

Vulnerability Assessment Summary
Check for the version of the screen package

Detailed Explanation for this Vulnerability Assessment

The remote host is missing the patch for the advisory MDKSA-2003:113 (screen).


A vulnerability was discovered and fixed in screen by Timo Sirainen who found an
exploitable buffer overflow that permited privilege escalation. This
vulnerability also has the potential to permit attackers to gain control of
another user's screen session. The ability to exploit is not trivial and
requires approximately 2GB of data to be transferred in order to do so.
Updated packages are available that fix the vulnerability.


Solution : http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2003:113
Network Security Threat Level: High

Networks Security ID: 9117

Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security

Cables, Connectors

NEW Corsair Vengeance LPX 3200MHz 16GB (2x8GB) DDR4 DRAM C16 Memory Kit
$253.37
NEW Corsair Vengeance LPX 3200MHz 16GB (2x8GB) DDR4 DRAM C16 Memory Kit pictureSamsung set 2 X 4GB SO-DIMM 1600 MHz PC3-12800 DDR3 Memory M471B5173DB0-YK0
$35.0
Samsung set 2 X 4GB SO-DIMM 1600 MHz PC3-12800 DDR3 Memory M471B5173DB0-YK0 pictureKingston 4GB 2Rx4 PC2-5300F KTH-XW667/8G
$3.79
Kingston 4GB 2Rx4 PC2-5300F KTH-XW667/8G picture2X Kingston KTD-WS533/4G (2 x 2GB) 2RX8 PC2-4200F Server Memory
$3.99
2X Kingston KTD-WS533/4G (2 x 2GB) 2RX8 PC2-4200F Server Memory picture


Discussions

No Discussions have been posted on this vulnerability.