Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Red Hat Local Security Checks >> RHSA-2004-344: semi


Vulnerability Assessment Details

RHSA-2004-344: semi

Vulnerability Assessment Summary
Check for the version of the semi package

Detailed Explanation for this Vulnerability Assessment

The remote host is running a vulnerable version of SEMI.

Semi is a MIME library for GNU Emacs and XEmacs used by the wl mail package.

This version of SEMI is vulnerable to a bug wherein temporary files
are created in a manner which would permit local users to overwrite
and/or read potentially confidential data. A possible hacker, exploiting
this flaw, would need local access to the machine and the ability
to create or modify files as they are being created.

Solution : http://rhn.redhat.com/errata/RHSA-2004-344.html

Network Security Threat Level: Medium

Networks Security ID: 10259

Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security

Cables, Connectors

DELL POWEREDGE R730 8 BAY E5-2650V3 2.3GHZ 384GB 7 X 500GB SATA H730
$9069.0
DELL POWEREDGE R730 8 BAY E5-2650V3 2.3GHZ 384GB 7 X 500GB SATA H730 pictureDELL POWEREDGE M910 SERVER TWO E7-2870 2.4GHZ 192GB 1.2TB 10K SAS
$2049.0
DELL POWEREDGE M910 SERVER TWO E7-2870 2.4GHZ 192GB 1.2TB 10K SAS pictureHPE HP DL380 G9 Gen9 SERVER TWO E5-2660V4 2GHZ 192GB 800GB SAS SSD
$8399.0
HPE HP DL380 G9 Gen9 SERVER TWO E5-2660V4 2GHZ 192GB 800GB SAS SSD pictureDELL POWEREDGE R730 8 BAY E5-2620V4 2.1GHZ 384GB 200GB SSD SAS H730
$8059.0
DELL POWEREDGE R730 8 BAY E5-2620V4 2.1GHZ 384GB 200GB SSD SAS H730 picture


Discussions

No Discussions have been posted on this vulnerability.