Vulnerability Assessment & Network Security Forums

If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.

Home >> Browse Vulnerability Assessment Database >> Red Hat Local Security Checks >> RHSA-2003-231: semi

Vulnerability Assessment Details

RHSA-2003-231: semi

Vulnerability Assessment Summary
Check for the version of the semi package

Detailed Explanation for this Vulnerability Assessment

The remote host has an old version of the semi package installed.

semi is a MIME library for GNU Emacs and XEmacs, which is used by
the wl mail package.

There is a vulnerability in version 1.14.3 and earlier of this
software which may permit a possible hacker to overwrite arbitrary files
on the remote system with the rights of the user reading his
mail with wl.

To exploit this flaw, a possible hacker would need to send a carefully
crafted MIME encoded email to a victim on the remote host, and
wait for him to open it using wl.

Solution :
Network Security Threat Level: High

Networks Security ID: 8115

Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security

Cables, Connectors

Cisco Linksys EA3500
Cisco Linksys EA3500 pictureCisco 74-2905-03 7920 series cradle
Cisco 74-2905-03 7920 series cradle pictureCisco Catalyst WS-C3750X-48P-S No Power Supply - AM
Cisco Catalyst WS-C3750X-48P-S No Power Supply - AM pictureGenuine CISCO X2-10GB-ZR TRANSCEIVER 10-2358-01 IPUIA08RAA
Genuine CISCO X2-10GB-ZR TRANSCEIVER 10-2358-01 IPUIA08RAA picture


No Discussions have been posted on this vulnerability.