Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Mandrake Local Security Checks >> MDKSA-2004:014: metamail


Vulnerability Assessment Details

MDKSA-2004:014: metamail

Vulnerability Assessment Summary
Check for the version of the metamail package

Detailed Explanation for this Vulnerability Assessment

The remote host is missing the patch for the advisory MDKSA-2004:014 (metamail).


Two format string and two buffer overflow vulnerabilities were discovered in
metamail by Ulf Harnhammar. The updated packages are patched to fix these holes.


Solution : http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2004:014
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security

Cables, Connectors

Intel Pentium G3240 3.1GHz Dual Core CPU SR1K6 Socket LGA1150
$27.99
Intel Pentium G3240 3.1GHz Dual Core CPU SR1K6 Socket LGA1150 pictureAMD CPU fan and cooler
$0.99
AMD CPU fan and cooler pictureAMD Phenom II X6 1090T 3.2GHz Six Core (HDT90ZFBGRBOX) Processor
$35.0
AMD Phenom II X6 1090T 3.2GHz Six Core (HDT90ZFBGRBOX) Processor picture16-PROCESSOR HP XEON I7 3.33GHz 4 MONITOR TRADING COMPUTER w/18GB+128GB SSD+1TB
$449.0
16-PROCESSOR HP XEON I7 3.33GHz 4 MONITOR TRADING COMPUTER w/18GB+128GB SSD+1TB picture


Discussions

No Discussions have been posted on this vulnerability.