Summary
The remote host is missing an update to at
announced via advisory DSA 102-1.
Solution
https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20102-1
Insight
zen-parse found a bug in the current implementation of at which leads into a heap corruption vulnerability which in turn could potentially lead into an exploit of the daemon user.
We recommend that you upgrade your at packages.
Severity
Classification
-
CVE CVE-2002-0004 -
CVSS Base Score: 7.2
AV:L/AC:L/Au:N/C:C/I:C/A:C
Related Vulnerabilities
- Debian Security Advisory DSA 1070-1 (kernel-source-2.4.19,kernel-image-sparc-2.4,kernel-patch-2.4.19-mips)
- Debian Security Advisory DSA 1011-1 (kernel-patch-vserver, util-vserver)
- Debian Security Advisory DSA 108-1 (wmtv)
- Debian Security Advisory DSA 065-1 (samba)
- Debian Security Advisory DSA 1046-1 (mozilla)