|
Family: Gentoo Local Security Checks --> Category: infos
[GLSA-200511-01] libgda: Format string vulnerabilities Vulnerability Scan
Vulnerability Scan Summary libgda: Format string vulnerabilities
Detailed Explanation for this Vulnerability Test
The remote host is affected by the vulnerability described in GLSA-200511-01
(libgda: Format string vulnerabilities)
Steve Kemp discovered two format string vulnerabilities in the
gda_log_error and gda_log_message functions. Some applications may pass
untrusted input to those functions and be vulnerable.
Impact
A possible hacker could pass malicious input to an application making
use of the vulnerable libgda functions, potentially resulting in the
execution of arbitrary code with the rights of that application.
Workaround
There is no known workaround at this time.
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2958
Solution:
All libgda users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=gnome-extra/libgda-1.2.2-r1"
Threat Level: Medium
Click HERE for more information and discussions on this network vulnerability scan.
|