Family: Debian Local Security Checks --> Category: infos
[DSA082] DSA-082-1 xvt Vulnerability Scan
Vulnerability Scan Summary
Detailed Explanation for this Vulnerability Test
Christophe Bailleux reported on bugtraq that Xvt is vulnerable to a
buffer overflow in its argument handling. Since Xvt is installed
setuid root, it was possible for a normal user to pass
carefully-crafted arguments to xvt so that xvt executed a root shell.
This problem has been fixed by the maintainer in version 2.1-13 of xvt
for Debian unstable and 2.1-13.0potato.1 for the stable Debian
We recommend that you upgrade your xvt package immediately.
Solution : http://www.debian.org/security/2001/dsa-082
Threat Level: High
Click HERE for more information and discussions on this network vulnerability scan.