Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Gentoo Local Security Checks >> Unmaintainted Gentoo packages


Vulnerability Assessment Details

Unmaintainted Gentoo packages

Vulnerability Assessment Summary
Find obsolete Gentoo packages that cannot be installed any more

Detailed Explanation for this Vulnerability Assessment

Summary :

The remote operating system contains obsolete software

Description :

The remote Gentoo system contains several packages or versions
which have been marked as obsolete and have been removed from
the portage tree.
These versions are therefore unmaintained, which means that if
any security flaw is found in them, no patch will be made
available.

In addition to this, these packages might break after a library
upgrade and it will be impossible to recompile them.

Solution:

Remove or upgrade those packages.

Network Security Threat Level:

Medium / CVSS Base Score : 6
(AV:R/AC:H/Au:NR/C:P/A:P/I:P/B:N)


Networks Security ID:

Vulnerability Assessment Copyright: Copyright (C) 2007 Michel Arboi

Cables, Connectors

Microsoft Windows Server 2016 Essentials Raid 1 Office Home Business 2x2TB G351
$1249.0
Microsoft Windows Server 2016 Essentials Raid 1 Office Home Business 2x2TB  G351 pictureWestern Digital My Book Thunderbolt Duo 8TB External Dual Hard Drive with RAID
$0.99
Western Digital My Book Thunderbolt Duo 8TB External Dual Hard Drive with RAID pictureSANS DIGITAL TOWER RAID TR4UTBP - 4 BAY USB 3.0
$79.0
SANS DIGITAL TOWER RAID TR4UTBP - 4 BAY USB 3.0 pictureSIIG SATA 4-Channel RAID
$45.0
SIIG SATA 4-Channel RAID picture


Discussions

No Discussions have been posted on this vulnerability.