Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Mandrake Local Security Checks >> MDKSA-2005:203: gda2.0


Vulnerability Assessment Details

MDKSA-2005:203: gda2.0

Vulnerability Assessment Summary
Check for the version of the gda2.0 package

Detailed Explanation for this Vulnerability Assessment

The remote host is missing the patch for the advisory MDKSA-2005:203 (gda2.0).



Steve Kemp discovered two format string vulnerabilities in libgda2, the GNOME
Data Access library for GNOME2, which may lead to the execution of arbitrary
code in programs that use this library. The updated packages have been patched
to correct this issue.



Solution : http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2005:203
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2006 Tenable Network Security

Cables, Connectors

Dell PowerEdge R320 1 x E5-2470, PERC H710, 16GB Ram
$1429.0
Dell PowerEdge R320 1 x E5-2470, PERC H710, 16GB Ram picture8GB 2RX4 PC3L-10600R DDR3 ECC Server Memory or Workstations x 8 = 64GB
$50.0
8GB 2RX4 PC3L-10600R DDR3 ECC Server Memory or Workstations x 8 = 64GB pictureHP ProLiant DL380 Gen9 E5-2620v3 16GB-R 2x800W Base Server 752688-B21 ReNew WTY
$2620.0
HP ProLiant DL380 Gen9 E5-2620v3 16GB-R 2x800W Base Server 752688-B21 ReNew WTY pictureSunblade 1500 Silver 1.5 / 4GB / 160GB
$650.0
Sunblade 1500 Silver 1.5 / 4GB / 160GB picture


Discussions

No Discussions have been posted on this vulnerability.