Mageia Linux Local Check: mgasa-2016-0053

Published: 2016-02-08 17:55:15
CVE Author: NIST National Vulnerability Database (NVD)

Technical Details:
In socat before 2.0.0-b9, in the OpenSSL address implementation, the hard coded 1024 bit DH p parameter was not prime. It may be possible for an eavesdropper to recover the shared secret from a key exchange (CVE-2016-2217). In socat before 2.0.0-b9, a stack overflow vulnerability was found that can be triggered when command line arguments are longer than 512 bytes. This vulnerability can only be exploited when an attacker is able to inject data into socat's command line.

Recommendations:
Update the affected Linux Distribution Packages to the latest available version.

Solution Type:
Vendor Patch

CVSS Base Vector:
AV:N/AC:L/Au:N/C:P/I:N/A:N

Detection Type:
Linux Distribution Package

Summary:
Mageia Linux Local Security Checks mgasa-2016-0053

NIST (National Institute of Standards and Technology) NVD (National Vulnerability Database)

https://nvd.nist.gov/vuln/detail/CVE-2016-2217

References:

https://advisories.mageia.org/MGASA-2016-0053.html

Search
Severity
Medium
CVSS Score
5.0

You never have to pay for a vulnerability scanning and management software again.

Tired of paying a subscription 'per asset' or 'per IP'? Well you can officially cancel your current subscription. Mageni provides a free, open source and enterprise-ready vulnerability scanning and management platform which helps you to find, prioritize, remediate and manage your vulnerabilities. It is free and always will be.