Search for in Google by Dino

Google Custom Search

miércoles, 20 de diciembre de 2006

Mandrake Security Advisory MDKSA-2006:228 (gnupg)

ID de Prueba: 57707
Categoría: Mandrake Local Security Checks
Título: Mandrake Security Advisory MDKSA-2006:228 (gnupg)
Resumen: Mandrake Security Advisory MDKSA-2006:228 (gnupg)
Descripción:
The remote host is missing an update to gnupg
announced via advisory MDKSA-2006:228.

A stack overwrite vulnerability in GnuPG (gpg) allows attackers to
execute arbitrary code via crafted OpenPGP packets that cause GnuPG to
dereference a function pointer from deallocated stack memory.

Updated packages have been patched to correct this issue.

Affected: 2006.0, 2007.0, Corporate 3.0, Corporate 4.0,
Multi Network Firewall 2.0

Solution:
To upgrade automatically use MandrakeUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

https://secure1.securityspace.com/smysecure/catid.html?in=MDKSA-2006:228

Risk factor : High
Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2006-6235

No hay comentarios.: