Summary
The remote host is missing an update to perl-DBD-Pg announced via advisory MDVSA-2009:344.
Solution
To upgrade automatically use MandrakeUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.
https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:344
Insight
Multiple vulnerabilities was discovered and corrected in perl-DBD-Pg:
Heap-based buffer overflow in the DBD::Pg module for Perl might allow context-dependent attackers to execute arbitrary code via unspecified input to an application that uses the getline and pg_getline functions to read database rows.
Memory leak in the dequote_bytea function in quote.c in the DBD::Pg (aka DBD-Pg or libdbd-pg-perl) module before 2.0.0 for Perl allows context-dependent attackers to cause a denial of service (memory consumption) by fetching data with BYTEA columns (CVE-2009-1341).
Packages for 2008.0 are provided for Corporate Desktop 2008.0 customers.
This update provides a fix for these vulnerabilities.
Affected: 2008.0
Severity
Classification
-
CVE CVE-2009-0663, CVE-2009-1341 -
CVSS Base Score: 7.5
AV:N/AC:L/Au:N/C:P/I:P/A:P
Related Vulnerabilities