Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> SuSE Local Security Checks >> SUSE-SA:2006:073: mono-core


Vulnerability Assessment Details

SUSE-SA:2006:073: mono-core

Vulnerability Assessment Summary
Check for the version of the mono-core package

Detailed Explanation for this Vulnerability Assessment

The remote host is missing the patch for the advisory SUSE-SA:2006:073 (mono-core).


Sebastian Krahmer of SUSE Security found that the Mono
System.Xml.Serialization class contained a /tmp race which potentially
permits local attackers to execute code as the user using the
Serialization method.

This is tracked by the Mitre CVE ID CVE-2006-5072.

Packages for all affected distributions were released on November 10th,
and for SLE 10 on November 27th.


Solution : http://www.suse.de/security/http://www.novell.com/linux/security/advisories/2006_73_mono.html
Network Security Threat Level: Medium

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2007 Tenable Network Security

Cables, Connectors

Vintage Atari 600XL Game Computer Keyboard Console System for parts or repair
$20.0
Vintage Atari 600XL Game Computer Keyboard Console System  for parts or repair pictureVintage Atari 400 Home Computer w/ Missile Command WORKS
$99.99
Vintage Atari 400 Home Computer w/ Missile Command WORKS pictureCommodore CD32 Power Supply NEW
$25.0
Commodore CD32  Power Supply NEW pictureFleet System 2 Word Processing for Commodore 64, 128 and Atari 800XL & 130XE
$14.95
Fleet System 2 Word Processing for Commodore 64, 128 and Atari 800XL & 130XE  picture


Discussions

No Discussions have been posted on this vulnerability.