|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> Red Hat Local Security Checks >> RHSA-2003-242: ddskk Vulnerability Assessment Details
|
RHSA-2003-242: ddskk |
||
Check for the version of the ddskk package Detailed Explanation for this Vulnerability Assessment The remote host has an old version of the ddskk package installed. ddskk (Daredevil SKK) is a Kana to Kanji conversion program. There is a bug in the remote version of this package in the way it creates temporary files which may permit a local attacker to overwrite arbitrary files owned by the user using ddskk. Solution : https://rhn.redhat.com/errata/RHSA-2003-242.html Network Security Threat Level: Medium Networks Security ID: 8144 Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security |
||
Cables, Connectors |
DELL PowerEdge R730XD 24x 2.5" Server Dual 750W Dual Heatsink - BareBones TESTED
$269.99
Supermicro 4U 36 Bay Storage Server 2.4Ghz 8-C 128GB 1x1280W Rails TrueNAS ZFS
$721.06
CSE-118 Supermicro 1U GPU Server 2.6Ghz 28-C 128GB 2x Nvidia K40 GPU 2x1600W PSU
$580.03
Dell PowerEdge R740XD Server | 2x Gold 6140 | 128GB | H730P | 8x 3.5" HDD Tray
$2589.00
Intel Xeon E5-2680 v4 2.4GHz 35MB 14-Core 120W LGA2011-3 SR2N7
$17.99
Intel Xeon Gold 6140 SR3AX 2.3GHz 18-Core Processor CPU
$44.99
Intel Xeon E5-2697 v2 2.7GHz 30M 12-Core LGA2011 CPU Processor SR19H
$27.99
HP Z4G4 Intel Xeon W2133-3.6 GHz, 256 NVME, 6TB HDD, 32GB RAM P620 NO OS
$265.00
HP ProLiant DL380 Gen9 16SFF 2x E5-2680v4 2.4GHz =28 Cores 64GB P840 4xRJ45
$353.00
Intel Xeon Gold 5218 2.3GHZ 16-Core CPU / PROCESSOR ____ SRFBT
$399.00
|
||
No Discussions have been posted on this vulnerability. |