Summary
The remote host is missing updates announced in
advisory GLSA 200505-02.
Solution
All Oops! users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose
'>=net-proxy/oops-1.5.24_pre20050503'
http://www.securityspace.com/smysecure/catid.html?in=GLSA%20200505-02 http://bugs.gentoo.org/show_bug.cgi?id=91303
Insight
The Oops! proxy server contains a remotely exploitable format string vulnerability, which could potentially lead to the execution of arbitrary code.
Severity
Classification
-
CVE CVE-2005-1121 -
CVSS Base Score: 5.0
AV:N/AC:L/Au:N/C:N/I:P/A:N
Related Vulnerabilities