|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> Debian Local Security Checks >> [DSA128] DSA-128-1 sudo Vulnerability Assessment Details
|
[DSA128] DSA-128-1 sudo |
||
DSA-128-1 sudo Detailed Explanation for this Vulnerability Assessment fc found a buffer overflow in the variable expansion code used by sudo for its prompt. Since sudo is necessarily installed suid root a local user can use this to gain root access. This has been fixed in version 1.6.2-2.2 for the stable distribution of Debian and version 1.6.6-1 for the testing/unstable distribution. We recommend that you upgrade your sudo package immediately. Solution : http://www.debian.org/security/2002/dsa-128 Network Security Threat Level: High Networks Security ID: 4593 Vulnerability Assessment Copyright: This script is (C) 2005 Michel Arboi |
||
Cables, Connectors |
Vintage 5362 IBM System/36 Mini-Computer Mainframe 5291 2, CRT Terminal DM12N501
$249.99
Magitronic Quad Speed Creative
$150.00
Vintage Hewlett Packard HP 2100S Microprogrammable Computer System Mainframe #2
$1499.99
IBM Type 4869 External 5 1/4in Floppy Disk Drive Mainframe Collection - UNTESTED
$75.00
IBM 3390 DASD Hard Drive 10.8” from Vintage Mainframe
$325.00
Lot of 2 Vintage DEC Digital Computer Mainframe VT100 Keyboards Untested
$239.99
Vintage Hewlett Packard HP 2100A Microprogrammable Computer System Mainframe
$1499.99
IBM System 370 vintage 8 inch diagnostic and control diskettes (lot of 3)
$21.75
IVIS Mainframe Mechanical Keyboard RJ11 Wired Keyboard Mainframe Collection
$584.99
Vintage IBM AS/400 Advanced 36 Mainframe Unit - Powers On. Has Error Codes
$1080.00
|
||
No Discussions have been posted on this vulnerability. |