|
Family: Gentoo Local Security Checks --> Category: infos
[GLSA-200405-08] Pound format string vulnerability Vulnerability Scan
Vulnerability Scan Summary Pound format string vulnerability
Detailed Explanation for this Vulnerability Test
The remote host is affected by the vulnerability described in GLSA-200405-08
(Pound format string vulnerability)
A format string flaw in the processing of syslog messages was discovered
and corrected in Pound.
Impact
This flaw may allow remote execution of arbitrary code with the rights of
the Pound daemon process. By default, Gentoo uses the "nobody" user to run
the Pound daemon.
Workaround
There is no known workaround at this time. All users are advised to upgrade
to the latest available version of Pound.
References:
http://www.apsis.ch/pound/pound_list/archive/2003/2003-12/1070234315000#1070234315000
Solution:
All users of Pound should upgrade to the latest stable version:
# emerge sync
# emerge -pv ">=net-www/pound-1.6"
# emerge ">=net-www/pound-1.6"
Threat Level: High
Click HERE for more information and discussions on this network vulnerability scan.
|