![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.52771 |
Category: | Fedora Local Security Checks |
Title: | Fedora Legacy Security Advisory FLSA-2004:1187 |
Summary: | NOSUMMARY |
Description: | Description: The remote host is missing updates announced in advisory FLSA-2004:1187. The screen utility allows you to have multiple logins on just one terminal. Screen is useful for users who telnet into a machine or are connected via a dumb terminal, but want to use more than just one login. Timo Sirainen has reported an integer signedness error in ansi.c for GNU screen 4.0.1 and earlier, and 3.9.15 and earlier, which allows local users to execute arbitrary code via a large number of (semicolon) characters in escape sequences, which leads to a buffer overflow. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2003-0966 to this issue. Users of screen should update to these update packages, which contain a backported security patch that corrects this issue. Fedora Legacy would like to thank Timo Sirainen for discovering and disclosing this issue, and Jason Rohwedder and Christian Pearce for providing a backported fix for Red Hat Linux 7.2, 7.3, and 8.0. All users are advised to upgrade to these update packages, which contain a backported security patch that corrects this issue. Affected platforms: Redhat 7.2 Redhat 7.3 Redhat 8 Solution: https://secure1.securityspace.com/smysecure/catid.html?in=FLSA-2004:1187 http://marc.theaimsgroup.com/?l=bugtraq&m=106995837813873&w=2 Risk factor : Critical CVSS Score: 10.0 |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2003-0972 Bugtraq: 20031127 GNU screen buffer overflow (Google Search) http://marc.info/?l=bugtraq&m=106995837813873&w=2 Conectiva Linux advisory: CLA-2004:809 http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000809 Debian Security Information: DSA-408 (Google Search) http://www.debian.org/security/2004/dsa-408 http://www.mandriva.com/security/advisories?name=MDKSA-2003:113 http://secunia.com/advisories/10539 Common Vulnerability Exposure (CVE) ID: CVE-2003-0966 BugTraq ID: 9430 http://www.securityfocus.com/bid/9430 http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=112078 http://www.redhat.com/support/errata/RHSA-2004-009.html SGI Security Advisory: 20040103-01-U ftp://patches.sgi.com/support/free/security/advisories/20040103-01-U.asc XForce ISS Database: elm-frm-subject-bo(14840) https://exchange.xforce.ibmcloud.com/vulnerabilities/14840 |
Copyright | Copyright (c) 2005 E-Soft Inc. http://www.securityspace.com |
This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |