Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Mandrake Local Security Checks >> MDKSA-2004:130: speedtouch


Vulnerability Assessment Details

MDKSA-2004:130: speedtouch

Vulnerability Assessment Summary
Check for the version of the speedtouch package

Detailed Explanation for this Vulnerability Assessment

The remote host is missing the patch for the advisory MDKSA-2004:130 (speedtouch).



The Speedtouch USB driver contains a number of format string vulnerabilities
due to improperly made syslog() system calls. These vulnerabilities can be
abused by a local user to potentially permit the execution of arbitray code with
elevated rights.

The updated packages have been patched to prevent this problem.



Solution : http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2004:130
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security

Cables, Connectors

Juniper EX 4200 EX4200 VCP Virtual Chassis Port Cable EX-CBL-VCP-50CM .5M
$24.99
Juniper EX 4200 EX4200 VCP Virtual Chassis Port Cable EX-CBL-VCP-50CM .5M pictureJuniper Networks Netscreen NS-5GT-001 4 Port 10/100 Wired VPN Firewall w/Adapter
$4.7
Juniper Networks Netscreen NS-5GT-001 4 Port 10/100 Wired VPN Firewall w/Adapter pictureFor Juniper, XFP-10GE-LR XFP-10G-LR, XFP 10GBase-LR 1310nm 10KM
$69.0
For Juniper, XFP-10GE-LR XFP-10G-LR, XFP 10GBase-LR 1310nm 10KM pictureFor Juniper, XFP-10GE-LR XFP-10G-LR, XFP 10GBase-LR 1310nm 10KM
$29.0
For Juniper, XFP-10GE-LR XFP-10G-LR, XFP 10GBase-LR 1310nm 10KM picture


Discussions

No Discussions have been posted on this vulnerability.