|Category:||SuSE Local Security Checks|
|Title:||SUSE: Security Advisory (SUSE-SU-2020:1417-1)|
|Summary:||The remote host is missing an update for the 'freetds' package(s) announced via the SUSE-SU-2020:1417-1 advisory.|
The remote host is missing an update for the 'freetds' package(s) announced via the SUSE-SU-2020:1417-1 advisory.
This update for freetds to 1.1.36 fixes the following issues:
Security issue fixed:
CVE-2019-13508: Fixed a heap overflow that could have been caused by
malicious servers sending UDT types over protocol version 5.0
Non-security issues fixed:
Enabled Kerberos support
Version update to 1.1.36:
* Default TDS protocol version is now 'auto'
* Improved UTF-8 performances
* TDS Pool Server is enabled
* MARS support is enabled
* NTLMv2 is enabled
* See NEWS and ChangeLog for a complete list of changes
'freetds' package(s) on SUSE Linux Enterprise Module for Server Applications 15-SP1
Please install the updated package(s).
Common Vulnerability Exposure (CVE) ID: CVE-2019-13508|
|Copyright||Copyright (C) 2021 Greenbone Networks GmbH|
|This is only one of 97459 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.