Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Mandrake Local Security Checks >> MDKSA-2004:038: sysklogd


Vulnerability Assessment Details

MDKSA-2004:038: sysklogd

Vulnerability Assessment Summary
Check for the version of the sysklogd package

Detailed Explanation for this Vulnerability Assessment

The remote host is missing the patch for the advisory MDKSA-2004:038 (sysklogd).


Steve Grubb discovered a bug in sysklogd where it allocates an insufficient
amount of memory which causes sysklogd to write to unallocated memory. This
could permit for a malicious user to crash sysklogd.
The updated packages provide a patched sysklogd using patches from Openwall to
correct the problem and also corrects the use of an unitialized variable (a
previous use of 'count').


Solution : http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2004:038
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security

Cables, Connectors

Vintage DIAMOND STEALTH 64 DRAM T PCI PCI VIDEO ADAPTER S3 FTUPCI7642M
$21.65
Vintage DIAMOND STEALTH 64 DRAM T PCI PCI VIDEO ADAPTER S3 FTUPCI7642M pictureVintage CPATH 56K External Fax Modem SURFER v.90, NEW SEALED
$21.86
Vintage CPATH 56K External Fax Modem SURFER v.90, NEW SEALED pictureLOT of 2 Vintage 2.5" Hard Drives, Conner CP 2034,and Toshiba HD2212
$26.99
LOT of 2 Vintage 2.5MODCOMP Vintage Computer Hard Drive From NASA Space Station Engineering Station
$215.0
MODCOMP Vintage Computer Hard Drive From NASA Space Station Engineering Station picture


Discussions

No Discussions have been posted on this vulnerability.