Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Mandrake Local Security Checks >> MDKSA-2006:065: kaffeine


Vulnerability Assessment Details

MDKSA-2006:065: kaffeine

Vulnerability Assessment Summary
Check for the version of the kaffeine package

Detailed Explanation for this Vulnerability Assessment

The remote host is missing the patch for the advisory MDKSA-2006:065 (kaffeine).



Marcus Meissner discovered Kaffeine contains an unchecked buffer while creating
HTTP request headers for fetching remote RAM playlists, which permits
overflowing a heap allocated buffer. As a result, remotely supplied RAM
playlists can be used to execute arbitrary code on the client machine. Updated
packages have been patched to correct this issue.



Solution : http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2006:065
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2006 Tenable Network Security

Cables, Connectors

Vintage maroon Mac Bag Computer Bag by Linebacker-16" w/keyboard & side pocket
$14.99
Vintage maroon Mac Bag Computer Bag by Linebacker-16Sealed Vintage CAKEWALK IN CONCERT Virtual Backup Band Software Win 95/Mac OS
$55.0
Sealed Vintage CAKEWALK IN CONCERT Virtual Backup Band Software Win 95/Mac OS pictureVintage Apple MacBook 13" Mac OS X V10.6.8 Plus Dummie Book
$49.99
Vintage Apple MacBook 13VIntage 1988 Mac Plus - Hyper card User's guide MAC APPLE Excellent RARE
$10.0
VIntage 1988 Mac Plus - Hyper card User's guide  MAC APPLE Excellent  RARE picture


Discussions

No Discussions have been posted on this vulnerability.