Summary
The remote host is missing an update as announced
via advisory SSA:2006-215-01.
Solution
https://secure1.securityspace.com/smysecure/catid.html?in=SSA:2006-215-01
Insight
New GnuPG packages are available for Slackware 9.0, 9.1, 10.0, 10.1, 10.2, and -current to fix security issues which could allow an attacker to crash gnupg and possibly overwrite memory which could lead to an integer overflow.
Severity
Classification
-
CVSS Base Score: 5.8
AV:N/AC:M/Au:N/C:P/I:P/A:N
Related Vulnerabilities
- Slackware Advisory SSA:2003-141-04 GnuPG key validation fix
- Slackware Advisory SSA:2003-141-06a REVISED quotacheck security fix in rc.M
- Slackware Advisory SSA:2005-269-02 X.Org pixmap overflow
- Slackware Advisory SSA:2003-168-01 2.4.21 kernels available
- Slackware Advisory SSA:2003-141-01 EPIC4 security fixes