Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Mandrake Local Security Checks >> MDKSA-2004:130: speedtouch


Vulnerability Assessment Details

MDKSA-2004:130: speedtouch

Vulnerability Assessment Summary
Check for the version of the speedtouch package

Detailed Explanation for this Vulnerability Assessment

The remote host is missing the patch for the advisory MDKSA-2004:130 (speedtouch).



The Speedtouch USB driver contains a number of format string vulnerabilities
due to improperly made syslog() system calls. These vulnerabilities can be
abused by a local user to potentially permit the execution of arbitray code with
elevated rights.

The updated packages have been patched to prevent this problem.



Solution : http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2004:130
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security

Cables, Connectors

HP Proliant BL460C G8 Barebones 2x Heatsinks ,P220i Raid,NO CPU,NO Ram,No HDD
$129.99
HP Proliant BL460C G8 Barebones 2x Heatsinks ,P220i Raid,NO CPU,NO Ram,No HDD  picture1U Supermicro X8DTU-6TF+ 2x E5640 48GB 8 Bay 2.5 Server RAID CSE-119 1026T-6RFT+
$175.0
1U Supermicro X8DTU-6TF+ 2x E5640 48GB 8 Bay 2.5 Server RAID CSE-119 1026T-6RFT+ pictureNEW Adaptec SCSI RAID 2100S Controller ASR-2100S SGL, 1883400
$25.0
NEW Adaptec SCSI RAID 2100S Controller ASR-2100S SGL, 1883400 pictureLaCie 5big Network 2 Professional 5 Bay RAID EMPT1207110055U
$36.11
LaCie 5big Network 2 Professional 5 Bay RAID EMPT1207110055U picture


Discussions

No Discussions have been posted on this vulnerability.