Vulnerability Scanning Solutions, LLC.
Home
Our Process
Residential
Corporate
What We Scan For
Sample Report
Client List
Terms
Contact Us
What We Scan For
Family: Gentoo Local Security Checks --> Category: infos

[GLSA-200405-08] Pound format string vulnerability Vulnerability Scan


Vulnerability Scan Summary
Pound format string vulnerability

Detailed Explanation for this Vulnerability Test
The remote host is affected by the vulnerability described in GLSA-200405-08
(Pound format string vulnerability)


A format string flaw in the processing of syslog messages was discovered
and corrected in Pound.

Impact

This flaw may allow remote execution of arbitrary code with the rights of
the Pound daemon process. By default, Gentoo uses the "nobody" user to run
the Pound daemon.

Workaround

There is no known workaround at this time. All users are advised to upgrade
to the latest available version of Pound.

References:
http://www.apsis.ch/pound/pound_list/archive/2003/2003-12/1070234315000#1070234315000


Solution:
All users of Pound should upgrade to the latest stable version:
# emerge sync
# emerge -pv ">=net-www/pound-1.6"
# emerge ">=net-www/pound-1.6"


Threat Level: High


Click HERE for more information and discussions on this network vulnerability scan.

VSS, LLC.

P.O. Box 827051

Pembroke Pines, FL 33082-7051

Vulnerability Scanning Solutions, LLC.