Summary
The remote host is missing an update to pavuk
announced via advisory DSA 527-1.
Solution
https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20527-1
Insight
Ulf Härnhammar discovered a vulnerability in pavuk, a file retrieval program, whereby an oversized HTTP 305 response sent by a malicious server could cause arbitrary code to be executed with the privileges of the pavuk process.
For the current stable distribution (woody), this problem has been fixed in version 0.9pl28-1woody1.
pavuk is no longer included in the unstable distribution of Debian.
We recommend that you update your pavuk package.
Severity
Classification
-
CVE CVE-2004-0456 -
CVSS Base Score: 7.6
AV:N/AC:H/Au:N/C:C/I:C/A:C
Related Vulnerabilities