Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Mandrake Local Security Checks >> MDKSA-2005:156: ntp


Vulnerability Assessment Details

MDKSA-2005:156: ntp

Vulnerability Assessment Summary
Check for the version of the ntp package

Detailed Explanation for this Vulnerability Assessment

The remote host is missing the patch for the advisory MDKSA-2005:156 (ntp).



When starting xntpd with the -u option and specifying the group by using a
string not a numeric gid the daemon uses the gid of the user not the group.

The updated packages have been patched to correct this problem.



Solution : http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2005:156
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2006 Tenable Network Security

Cables, Connectors

Vintage Manual Switch Data Box--Data Sharing Device--A/B data
$9.99
Vintage Manual Switch Data Box--Data Sharing Device--A/B data pictureAdtran NetVanta 1335 Multiservice Router 1700525E2 Black POE Power Over Ethernet
$499.0
Adtran NetVanta 1335 Multiservice Router 1700525E2 Black POE Power Over Ethernet pictureCISCO CATALYST 3550 SERIES WS-C3550-24-FX-SMI 24 PORT NETWORK SWITCH Bad Port
$13.0
CISCO CATALYST 3550 SERIES WS-C3550-24-FX-SMI 24 PORT NETWORK SWITCH Bad Port pictureCisco WS-C3750-48PS-S 3750 PoE 48-port Switch Lot of 3
$249.99
Cisco WS-C3750-48PS-S 3750 PoE 48-port Switch Lot of 3   picture


Discussions

No Discussions have been posted on this vulnerability.