Vulnerability Assessment & Network Security Forums

If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.

Home >> Browse Vulnerability Assessment Database >> SuSE Local Security Checks >> SUSE-SA:2002:037: heartbeat

Vulnerability Assessment Details

SUSE-SA:2002:037: heartbeat

Vulnerability Assessment Summary
Check for the version of the heartbeat package

Detailed Explanation for this Vulnerability Assessment

The remote host is missing the patch for the advisory SUSE-SA:2002:037 (heartbeat).

Heartbeat is a monitoring service that is used to implement
failover in high-availablity environments. It can be configured to
monitor other systems via serial connections, or via UDP/IP.

Several format string bugs have been discovered in the heartbeat
package. One of these format string bugs is in the normal path
of execution, all the remaining ones can only be triggered if
heartbeat is running in debug mode. Since heartbeat is running with
root privilege, this problem can possibly be exploited by remote
attackers, provided they are able to send packets to the UDP port
heartbeat is listening on (port 694 by default).

Vulnerable versions of heartbeat are included in SUSE LINUX 8.0 and

As a workaround, make sure that your firewall blocks all traffic
to the heartbeat UDP port.

The proper fix is to upgrade to the packages provided by SUSE.
In addition to fixing the format string bug, this update also
changes heartbeat to perform processing of network packets as
user 'nobody' instead of root. The update package for SUSE LINUX
8.1 also fixes a boot time problem with heartbeat.

SUSE wishes to thank Nathan Wallwork for reporting the bug, and Alan
Robertson for his assistance in dealing with this problem. For more
information on this vulnerability, please refer to

Please download the update package for your distribution and verify its
integrity by the methods listed in section 3) of this announcement.
Then, install the package using the command 'rpm -Fhv file.rpm' to apply
the update.

Solution :
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security

Cables, Connectors

G-Technology 500GB G-DRIVE mobile SSD R-Series Storage 0g08055
G-Technology 500GB G-DRIVE mobile SSD R-Series Storage 0g08055  pictureKingDian SSD 60GB 2.5" SATA3 Solid State Drive Hard Disk for Desktop Laptop M2Q4
KingDian SSD 60GB 2.5USB 3.0 to 2.5 inch SATA 22 Pin III HDD SSD Hard drive disk power Adapter cable
USB 3.0 to 2.5 inch SATA 22 Pin III HDD SSD Hard drive disk power Adapter cable pictureHP SSD S700 2.5" 120GB SATA III 3D NAND Internal Solid State Drive (SSD) 2DP97AA
HP SSD S700 2.5


No Discussions have been posted on this vulnerability.