Summary
The remote host is missing an update to the system as announced in the referenced advisory.
Solution
Update your system with the appropriate patches or software upgrades.
http://www.securityfocus.com/archive/1/342736
http://www.henschelsoft.de/kpopup_en.html
http://www.vuxml.org/freebsd/1613db79-8e52-11da-8426-000fea0a9611.html
Insight
The following package is affected: kpopup
CVE-2003-1170
Format string vulnerability in main.cpp in kpopup 0.9.1 and 0.9.5pre2 allows local users to cause a denial of service (segmentation fault) and possibly execute arbitrary code via format string specifiers in command line arguments.
CVE-2003-1167
misc.cpp in KPopup 0.9.1 trusts the PATH variable when executing killall, which allows local users to elevate their privileges by modifying the PATH variable to reference a malicious killall program.
Severity
Classification
-
CVE CVE-2003-1167, CVE-2003-1170 -
CVSS Base Score: 7.2
AV:L/AC:L/Au:N/C:C/I:C/A:C
Related Vulnerabilities