Vulnerability Scanning Solutions, LLC.
Home
Our Process
Residential
Corporate
What We Scan For
Sample Report
Client List
Terms
Contact Us
What We Scan For
Family: Red Hat Local Security Checks --> Category: infos

RHSA-2003-008: mgetty Vulnerability Scan


Vulnerability Scan Summary
Check for the version of the mgetty packages

Detailed Explanation for this Vulnerability Test


Updated Mgetty packages are now available to fix a possible buffer overflow
and a permissions problem.

Mgetty is a getty replacement for use with data and fax modems.

Mgetty can be configured to run an external program to decide whether or
not to answer an incoming call based on Caller ID information. Versions of
Mgetty prior to 1.1.29 would overflow an internal buffer if the caller name
reported by the modem was too long.

Additionally, the faxspool script supplied with versions of Mgetty prior to
1.1.29 used a simple permissions scheme to allow or deny fax transmission
rights. This scheme was easily circumvented because the spooling
directory used for outgoing faxes was world-writable.

All users of Mgetty should upgrade to these errata packages, which
contain Mgetty 1.1.30 and are not vulnerable to these issues.




Solution : http://rhn.redhat.com/errata/RHSA-2003-008.html
Threat Level: High

Click HERE for more information and discussions on this network vulnerability scan.

VSS, LLC.

P.O. Box 827051

Pembroke Pines, FL 33082-7051

Vulnerability Scanning Solutions, LLC.