ID de Prueba: 57707
Categoría: Mandrake Local Security Checks
Título: Mandrake Security Advisory MDKSA-2006:228 (gnupg)
Resumen: Mandrake Security Advisory MDKSA-2006:228 (gnupg)
Descripción:
The remote host is missing an update to gnupg
announced via advisory MDKSA-2006:228.
A stack overwrite vulnerability in GnuPG (gpg) allows attackers to
execute arbitrary code via crafted OpenPGP packets that cause GnuPG to
dereference a function pointer from deallocated stack memory.
Updated packages have been patched to correct this issue.
Affected: 2006.0, 2007.0, Corporate 3.0, Corporate 4.0,
Multi Network Firewall 2.0
Solution:
To upgrade automatically use MandrakeUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
https://secure1.securityspace.com/smysecure/catid.html?in=MDKSA-2006:228
Risk factor : High
Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2006-6235
Search for in Google by Dino
miércoles, 20 de diciembre de 2006
Mandrake Security Advisory MDKSA-2006:228 (gnupg)
Publicado por http://hackinganddefense.blogspot.com/ Etiquetas: SEGURIDAD INFORMATICA en 8:38 p.m.
Suscribirse a:
Comentarios de la entrada (Atom)
No hay comentarios.:
Publicar un comentario