Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Red Hat Local Security Checks >> RHSA-2003-193: arts


Vulnerability Assessment Details

RHSA-2003-193: arts

Vulnerability Assessment Summary
Check for the version of the arts packages

Detailed Explanation for this Vulnerability Assessment


Updated KDE packages that resolve a vulnerability in KDE's SSL
implementation are now available.

KDE is a graphical desktop environment for the X Window System.

KDE versions 2.2.2 and earlier have a vulnerability in their SSL
implementation that makes it possible for users of Konqueror and other SSL
enabled KDE software to fall victim to a man-in-the-middle attack.

Users of KDE should upgrade to these erratum packages, which contain KDE
2.2.2 with a backported patch to correct this vulnerability.




Solution : http://rhn.redhat.com/errata/RHSA-2003-193.html
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security

Cables, Connectors

IBM X3550 M3 1U Server Barebone Unit
$100.0
IBM X3550 M3 1U Server Barebone Unit picture1Pcs SUNON PMD1204PPBX-A DC12V 1.23A / 14.8W IBM server CPU fan
$15.25
1Pcs SUNON PMD1204PPBX-A DC12V 1.23A / 14.8W IBM server CPU fan pictureIBM System X3550 M4 8B 8-Core E5-2680 2.70GHz 32GB M5110 512MB No 2.5" HDD
$549.99
IBM System X3550 M4 8B 8-Core E5-2680 2.70GHz 32GB M5110 512MB No 2.5IBM QLOGIC QMI8142-IBM SERVER 10GB CONVERGED NETWORK ADAPTER 42C1832 42C1831
$40.0
IBM QLOGIC QMI8142-IBM SERVER 10GB CONVERGED NETWORK ADAPTER 42C1832 42C1831 picture


Discussions

No Discussions have been posted on this vulnerability.