Summary
The remote host is missing an update to perl-DBD-Pg announced via advisory MDVSA-2009:255.
Solution
To upgrade automatically use MandrakeUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.
https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:255
Insight
A vulnerability was discovered and corrected in perl-DBD-Pg:
Heap-based buffer overflow in the DBD::Pg module for Perl might allow context-dependent attackers to execute arbitrary code via unspecified input to an application that uses the getline and pg_getline functions to read database rows.
This update provides a fix for this vulnerability.
Affected: Corporate 4.0
Severity
Classification
-
CVE CVE-2009-0663 -
CVSS Base Score: 7.5
AV:N/AC:L/Au:N/C:P/I:P/A:P
Related Vulnerabilities