Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Red Hat Local Security Checks >> RHSA-2003-050: kon


Vulnerability Assessment Details

RHSA-2003-050: kon

Vulnerability Assessment Summary
Check for the version of the kon packages

Detailed Explanation for this Vulnerability Assessment


A buffer overflow in kon2 permits local users to obtain root rights.

KON is a Kanji emulator for the console. There is a buffer overflow
vulnerability in the command line parsing code portion of the kon program
up to and including version 0.3.9b. This vulnerability, if appropriately
exploited, can lead to local users being able to gain escalated (root)
rights.

All users of kon2 should update to these errata packages which contain a
patch to fix this vulnerability.

Red Hat would like to thank Janusz Niewiadomski for notifying us of this
issue.




Solution : http://rhn.redhat.com/errata/RHSA-2003-050.html
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security

Cables, Connectors

Cisco ASA 5515-X V02 | Adaptive Security Appliance IPS Firewall Security Plus
$400.0
Cisco ASA 5515-X V02 | Adaptive Security Appliance IPS Firewall Security Plus  pictureZyxel ZYWALL 110 VPN Firewall 
$165.0
Zyxel ZYWALL 110 VPN Firewall  pictureSonicWall Network Security Appliance 240 APL19-05C with Rack Shelf
$39.99
SonicWall Network Security Appliance 240 APL19-05C with Rack Shelf pictureNEW in box Cisco ASA 5516-X Security Appliance with FirePOWER Services NIB
$830.0
NEW in box Cisco ASA 5516-X Security Appliance with FirePOWER Services NIB picture


Discussions

No Discussions have been posted on this vulnerability.