Vulnerability Assessment & Network Security Forums

If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.

Home >> Browse Vulnerability Assessment Database >> Red Hat Local Security Checks >> RHSA-2005-381: nasm

Vulnerability Assessment Details

RHSA-2005-381: nasm

Vulnerability Assessment Summary
Check for the version of the nasm packages

Detailed Explanation for this Vulnerability Assessment

An updated nasm package that fixes multiple security issues is now

This update has been rated as having low security impact by the Red Hat
Security Response Team.

NASM is an 80x86 assembler.

Two stack based buffer overflow bugs have been found in nasm. A possible hacker
could create an ASM file in such a way that when compiled by a victim,
could execute arbitrary code on their machine. The Common Vulnerabilities
and Exposures project ( has assigned the names CVE-2004-1287
and CVE-2005-1194 to these issues.

All users of nasm are advised to upgrade to this updated package, which
contains backported fixes for these issues.

Solution :
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2005 Tenable Network Security

Cables, Connectors

Lenovo M700 Tiny (i7 6700, 256GB SSD, 8GB RAM) 10J0S2G008 Win7 Pro
Lenovo M700 Tiny (i7 6700, 256GB SSD, 8GB RAM) 10J0S2G008 Win7 Pro pictureSODIMM DDR4 HyperX Impact Kingston 16GB HX421S13IBK2/16 Dual Kit
SODIMM DDR4 HyperX Impact Kingston 16GB HX421S13IBK2/16 Dual Kit pictureHP Omen 15.6" Gaming Core I7-7700HQ 500GB NVME SSD 16gb RAM NVidia GTX 1050ti
HP Omen 15.6ASUS ZenBook UX303U 13.3" Touchscreen 2.3GHz i5-6500U 500GB SSD 8GB RAM
ASUS ZenBook UX303U 13.3


No Discussions have been posted on this vulnerability.