Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Red Hat Local Security Checks >> RHSA-2003-231: semi


Vulnerability Assessment Details

RHSA-2003-231: semi

Vulnerability Assessment Summary
Check for the version of the semi package

Detailed Explanation for this Vulnerability Assessment

The remote host has an old version of the semi package installed.

semi is a MIME library for GNU Emacs and XEmacs, which is used by
the wl mail package.

There is a vulnerability in version 1.14.3 and earlier of this
software which may permit a possible hacker to overwrite arbitrary files
on the remote system with the rights of the user reading his
mail with wl.

To exploit this flaw, a possible hacker would need to send a carefully
crafted MIME encoded email to a victim on the remote host, and
wait for him to open it using wl.

Solution : https://rhn.redhat.com/errata/RHSA-2003-231.html
Network Security Threat Level: High

Networks Security ID: 8115

Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security

Cables, Connectors

ioSafe 4TB SOLO G3 USB 3.0 W/ 1YR DRS (SK4TB)
$429.67
ioSafe 4TB SOLO G3 USB 3.0 W/ 1YR DRS (SK4TB) pictureHGST 8TB ULTRASTAR HE8 SAS 7200 RPM (0F23268)
$440.55
HGST 8TB ULTRASTAR HE8 SAS 7200 RPM (0F23268) pictureSeagate 800GB 12G SAS 2.5 MLC (ST800FM0043)
$1485.8
Seagate 800GB 12G SAS 2.5 MLC (ST800FM0043) pictureSeagate 600GB SAS 6GB/S 15K RPM SED (ST3600957SS)
$295.48
Seagate 600GB SAS 6GB/S 15K RPM SED (ST3600957SS) picture


Discussions

No Discussions have been posted on this vulnerability.