|
Test ID: | 1.3.6.1.4.1.25623.1.0.63146 |
Category: | Debian Local Security Checks |
Title: | Debian Security Advisory DSA 1699-1 (zaptel) |
Summary: | Debian Security Advisory DSA 1699-1 (zaptel) |
Description: | Description: The remote host is missing an update to zaptel announced via advisory DSA 1699-1. An array index error in zaptel, a set of drivers for telephony hardware, could allow users to crash the system or escalate their privileges by overwriting kernel memory (CVE-2008-5396). For the stable distribution (etch), this problem has been fixed in version 1.2.11.dfsg-1+etch1. For the unstable distribution (sid) and the testing distribution (lenny), this problem has been fixed in version 1.4.11~ dfsg-3. We recommend that you upgrade your zaptel package. Solution: https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201699-1 CVSS Score: 7.2 CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2008-5396 http://www.openwall.com/lists/oss-security/2008/12/03/10 http://secunia.com/advisories/32947 http://secunia.com/advisories/32960 Common Vulnerability Exposure (CVE) ID: CVE-2008-5744 http://www.openwall.com/lists/oss-security/2008/12/19/2 XForce ISS Database: zaptel-tor2-memory-overwrite(47666) https://exchange.xforce.ibmcloud.com/vulnerabilities/47666 |
Copyright | Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com |
This is only one of 58962 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |
|