Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Red Hat Local Security Checks >> RHSA-2003-193: arts


Vulnerability Assessment Details

RHSA-2003-193: arts

Vulnerability Assessment Summary
Check for the version of the arts packages

Detailed Explanation for this Vulnerability Assessment


Updated KDE packages that resolve a vulnerability in KDE's SSL
implementation are now available.

KDE is a graphical desktop environment for the X Window System.

KDE versions 2.2.2 and earlier have a vulnerability in their SSL
implementation that makes it possible for users of Konqueror and other SSL
enabled KDE software to fall victim to a man-in-the-middle attack.

Users of KDE should upgrade to these erratum packages, which contain KDE
2.2.2 with a backported patch to correct this vulnerability.




Solution : http://rhn.redhat.com/errata/RHSA-2003-193.html
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security

Cables, Connectors

Samsung 64GB 2Rx4 PC3-12800R Server RAM Memory M393B2G70BH0-CK0 Qty (4) (16GB)
$150.0
Samsung 64GB 2Rx4 PC3-12800R Server RAM Memory M393B2G70BH0-CK0 Qty (4) (16GB) pictureRM2-7955 Memory PC board - LJ Ent M501 / M506 / M527 series
$13.2
RM2-7955 Memory PC board - LJ Ent M501 / M506 / M527 series pictureHynix 1GB Pc-5300 Stick Of Desktop Memory
$0.99
Hynix 1GB Pc-5300 Stick Of Desktop Memory pictureCorsair 8 GB SO-DIMM 1066 MHz PC3-8500 DDR3 SDRAM Memory (CMSA8GX3M2A1066C7)
$39.99
Corsair 8 GB SO-DIMM 1066 MHz PC3-8500 DDR3 SDRAM Memory (CMSA8GX3M2A1066C7) picture


Discussions

No Discussions have been posted on this vulnerability.