Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Red Hat Local Security Checks >> RHSA-2003-050: kon


Vulnerability Assessment Details

RHSA-2003-050: kon

Vulnerability Assessment Summary
Check for the version of the kon packages

Detailed Explanation for this Vulnerability Assessment


A buffer overflow in kon2 permits local users to obtain root rights.

KON is a Kanji emulator for the console. There is a buffer overflow
vulnerability in the command line parsing code portion of the kon program
up to and including version 0.3.9b. This vulnerability, if appropriately
exploited, can lead to local users being able to gain escalated (root)
rights.

All users of kon2 should update to these errata packages which contain a
patch to fix this vulnerability.

Red Hat would like to thank Janusz Niewiadomski for notifying us of this
issue.




Solution : http://rhn.redhat.com/errata/RHSA-2003-050.html
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security

Cables, Connectors

Rare Atari 8 Bit Modem SX212 Tested ~ Very Good Vintage Used Condition
$48.0
Rare Atari 8 Bit Modem SX212 Tested ~ Very Good Vintage Used Condition  pictureVintage Plextor CD Caddy for Non Slot Loading CD Players/Readers
$5.0
Vintage Plextor CD Caddy for Non Slot Loading CD Players/Readers pictureOld motherboard DEC LS11 INTERFACE M7258 94VO BOARD COMPUTER VINTAGE
$45.95
Old motherboard DEC LS11 INTERFACE M7258 94VO BOARD COMPUTER VINTAGE pictureDEC M7867 5011561E-P1 DVP 11-DA BOARD VINTAGE COMPUTERS
$35.0
DEC M7867 5011561E-P1 DVP 11-DA BOARD VINTAGE COMPUTERS picture


Discussions

No Discussions have been posted on this vulnerability.