Executive Summary
Summary | |
---|---|
Title | New gopher packages fix several vulnerabilities |
Informations | |||
---|---|---|---|
Name | DSA-638 | First vendor Publication | 2005-01-13 |
Vendor | Debian | Last vendor Modification | 2005-01-13 |
Severity (Vendor) | N/A | Revision | 1 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 7.5 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
"jaguar" has discovered two security relevant problems in gopherd, the Gopher server in Debian which is part of the gopher package. The Common Vulnerabilities and Exposures project identifies the following vulnerabilities: CAN-2004-0560 An integer overflow can happen when posting content of a specially calculated size. CAN-2004-0561 A format string vulnerability has been found in the log routine. For the stable distribution (woody) these problems have been fixed in version 3.0.3woody2. The unstable distribution (sid) does not contain a gopherd package. It has been replaced by Pygopherd. We recommend that you upgrade your gopherd package. |
Original Source
Url : http://www.debian.org/security/2005/dsa-638 |
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 1 |
OpenVAS Exploits
Date | Description |
---|---|
2008-01-17 | Name : Debian Security Advisory DSA 638-1 (gopher) File : nvt/deb_638_1.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
55703 | UMN Gopher Daemon (gopherd) ftp.c Logging Routine Format String |
12913 | Gopher Server (gopherd) Log Routine Format String |
12912 | UMN Gopher Daemon (gopherd) do_command() Function Posting Content Overflow |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2005-01-18 | Name : The remote host is running a Gopher server that is affected by multiple vulne... File : gopher_overflow.nasl - Type : ACT_DESTRUCTIVE_ATTACK |
2005-01-13 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-638.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:33:45 |
|