Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Red Hat Local Security Checks >> RHSA-2003-193: arts


Vulnerability Assessment Details

RHSA-2003-193: arts

Vulnerability Assessment Summary
Check for the version of the arts packages

Detailed Explanation for this Vulnerability Assessment


Updated KDE packages that resolve a vulnerability in KDE's SSL
implementation are now available.

KDE is a graphical desktop environment for the X Window System.

KDE versions 2.2.2 and earlier have a vulnerability in their SSL
implementation that makes it possible for users of Konqueror and other SSL
enabled KDE software to fall victim to a man-in-the-middle attack.

Users of KDE should upgrade to these erratum packages, which contain KDE
2.2.2 with a backported patch to correct this vulnerability.




Solution : http://rhn.redhat.com/errata/RHSA-2003-193.html
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security

Cables, Connectors

OBi200 1-Port VoIP Phone Adapter with Google Voice and Fax Support for Home and
$58.03
OBi200 1-Port VoIP Phone Adapter with Google Voice and Fax Support for Home and  pictureVonage VDV21-VD VOIP Box with Power Adapter
$4.99
Vonage VDV21-VD VOIP Box with Power Adapter pictureMAKE OFFER Grandstream GXP2170 Enterprise 12 Line IP Phone 6 SIP VoIP Bluetooth
$130.35
MAKE OFFER Grandstream GXP2170 Enterprise 12 Line IP Phone 6 SIP VoIP Bluetooth picturePolycom SoundPoint IP 501 SIP VoIP Phone PoE Adapter Stand 220
$15.0
Polycom SoundPoint IP 501 SIP VoIP Phone PoE Adapter Stand 220 picture


Discussions

No Discussions have been posted on this vulnerability.