Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Red Hat Local Security Checks >> RHSA-2004-035: gmc


Vulnerability Assessment Details

RHSA-2004-035: gmc

Vulnerability Assessment Summary
Check for the version of the gmc packages

Detailed Explanation for this Vulnerability Assessment


Updated mc packages that resolve a buffer overflow vulnerability are now
available.

Midnight Commander is a visual shell much like a file manager.

A buffer overflow has been found in Midnight Commander's virtual filesystem
code. Specifically, a stack-based buffer overflow in vfs_s_resolve_symlink
of vfs/direntry.c permits remote attackers to execute arbitrary code during
symlink conversion.

Users of Midnight Commander should install these updated packages, which
resolve this issue.




Solution : http://rhn.redhat.com/errata/RHSA-2004-035.html
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security

Cables, Connectors

E3-1225v5 3.3 GHZ 8 MB CACHE LGA1151
$350.0
E3-1225v5 3.3 GHZ 8 MB CACHE LGA1151 pictureHP ProLiant DL360p G8 server, 2x 2.8GHz E5-2680v2 10-Core, 128GB to 256GB RAM
$951.0
HP ProLiant DL360p G8 server, 2x 2.8GHz E5-2680v2 10-Core, 128GB to 256GB RAM pictureHP ProLiant DL360p G8 server, 2x 2.8GHz E5-2680v2 10-Core, 128GB to 256GB RAM
$991.0
HP ProLiant DL360p G8 server, 2x 2.8GHz E5-2680v2 10-Core, 128GB to 256GB RAM pictureHP ProLiant DL360p G8 server, 2x 2.8GHz E5-2680v2 10-Core, 128GB to 256GB RAM
$951.0
HP ProLiant DL360p G8 server, 2x 2.8GHz E5-2680v2 10-Core, 128GB to 256GB RAM picture


Discussions

No Discussions have been posted on this vulnerability.