Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Red Hat Local Security Checks >> RHSA-2004-344: semi


Vulnerability Assessment Details

RHSA-2004-344: semi

Vulnerability Assessment Summary
Check for the version of the semi package

Detailed Explanation for this Vulnerability Assessment

The remote host is running a vulnerable version of SEMI.

Semi is a MIME library for GNU Emacs and XEmacs used by the wl mail package.

This version of SEMI is vulnerable to a bug wherein temporary files
are created in a manner which would permit local users to overwrite
and/or read potentially confidential data. A possible hacker, exploiting
this flaw, would need local access to the machine and the ability
to create or modify files as they are being created.

Solution : http://rhn.redhat.com/errata/RHSA-2004-344.html

Network Security Threat Level: Medium

Networks Security ID: 10259

Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security

Cables, Connectors

Asus P8H61-M PRO/CM6630-8/DP_MB Desktop Motherboard H61 USB 3.0 HDMI Socket LGA
$79.0
Asus P8H61-M PRO/CM6630-8/DP_MB  Desktop Motherboard H61 USB 3.0 HDMI Socket LGA pictureDigital DEC 54-30074-04 REV. A08 Motherboard for Alphaserver DS10 with CPU RAM
$174.99
Digital DEC 54-30074-04 REV. A08  Motherboard for Alphaserver DS10 with CPU RAM pictureDELL XP520 USB VGA Control Panel Board for PowerVault M1000E
$64.99
DELL XP520 USB  VGA Control Panel Board for  PowerVault M1000E pictureDell 84J0R Motherboard for Inspiron 660 Vostro 270 with I/0 Plate
$67.99
Dell 84J0R Motherboard for Inspiron 660 Vostro 270 with I/0 Plate picture


Discussions

No Discussions have been posted on this vulnerability.