|Category:||Debian Local Security Checks|
|Title:||Debian Security Advisory DSA 1699-1 (zaptel)|
|Summary:||Debian Security Advisory DSA 1699-1 (zaptel)|
The remote host is missing an update to zaptel
announced via advisory DSA 1699-1.
An array index error in zaptel, a set of drivers for telephony hardware,
could allow users to crash the system or escalate their privileges by
overwriting kernel memory (CVE-2008-5396).
For the stable distribution (etch), this problem has been fixed in version
For the unstable distribution (sid) and the testing distribution
(lenny), this problem has been fixed in version 1.4.11~
We recommend that you upgrade your zaptel package.
Common Vulnerability Exposure (CVE) ID: CVE-2008-5396|
Common Vulnerability Exposure (CVE) ID: CVE-2008-5744
XForce ISS Database: zaptel-tor2-memory-overwrite(47666)
|Copyright||Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com|
|This is only one of 53744 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.