Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Red Hat Local Security Checks >> RHSA-2004-344: semi


Vulnerability Assessment Details

RHSA-2004-344: semi

Vulnerability Assessment Summary
Check for the version of the semi package

Detailed Explanation for this Vulnerability Assessment

The remote host is running a vulnerable version of SEMI.

Semi is a MIME library for GNU Emacs and XEmacs used by the wl mail package.

This version of SEMI is vulnerable to a bug wherein temporary files
are created in a manner which would permit local users to overwrite
and/or read potentially confidential data. A possible hacker, exploiting
this flaw, would need local access to the machine and the ability
to create or modify files as they are being created.

Solution : http://rhn.redhat.com/errata/RHSA-2004-344.html

Network Security Threat Level: Medium

Networks Security ID: 10259

Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security

Cables, Connectors

Lot 2 Juniper Networks EX2200-48T-4G 750-026325 48-Port Gigabit Switch 4x SFP
$389.99
Lot 2 Juniper Networks EX2200-48T-4G 750-026325 48-Port Gigabit Switch 4x SFP pictureJuniper Networks EX2200-24P-4G 750-026464 24-Port Gigabit POE Switch 4x SFP Used
$289.93
Juniper Networks EX2200-24P-4G 750-026464 24-Port Gigabit POE Switch 4x SFP Used pictureJuniper EX4200-48T 8 PoE Switch W/ 2x EX-PWR-320-AC 90 Days Warranty
$300.0
Juniper EX4200-48T 8 PoE Switch W/ 2x EX-PWR-320-AC 90 Days Warranty pictureJuniper Networks T640 CHAS-BP-T640-S-A
$500.0
Juniper Networks T640 CHAS-BP-T640-S-A picture


Discussions

No Discussions have been posted on this vulnerability.