Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Mandrake Local Security Checks >> MDKSA-2007:009: kdenetwork


Vulnerability Assessment Details

MDKSA-2007:009: kdenetwork

Vulnerability Assessment Summary
Check for the version of the kdenetwork package

Detailed Explanation for this Vulnerability Assessment

The remote host is missing the patch for the advisory MDKSA-2007:009 (kdenetwork).

KsIRC 1.3.12 permits remote attackers to cause a denial of service
(crash) via a long PRIVMSG string when connecting to an Internet Relay
Chat (IRC) server, which causes an assertion failure and results in a
NULL pointer dereference.
Updated packages are patched to address this issue.

Solution : http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2007:009
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2007 Tenable Network Security

Cables, Connectors

MITS Altair 8800  Original Brochure, Technical  &  Software Information
$27.0
MITS Altair 8800  Original Brochure, Technical  &  Software Information  picture1988 MS-DOS 1.0 Encyclopedia HC MITS Altair 8800 IBM 5150 Bill Gates Intel 4004
$39.99
1988 MS-DOS 1.0 Encyclopedia HC MITS Altair 8800 IBM 5150 Bill Gates Intel 4004 picture1978 Small Computer Handbook ADM-3A Altair 8800 KIM-1 SWTPC OP-80A Paper Tape
$29.0
1978 Small Computer Handbook ADM-3A Altair 8800 KIM-1 SWTPC OP-80A Paper Tape pictureFully Functional Historic MITS Altair 8800 S-100 System. Working when packed
$10038.0
Fully Functional Historic MITS Altair 8800 S-100 System. Working when packed picture


Discussions

No Discussions have been posted on this vulnerability.