Users of Debian Security please be advised of a New cabextract packages fix arbitrary code execution vulnerability that has been identified.
To view this vulnerability, possible remedies, and others please check out the Security Advisories at Critical Watch (http://criticalwatch.com/support/security-advisories.aspx)
Amplify’d from www.criticalwatch.com
DSA 2087-1: DSA 2087-1 New cabextract packages fix arbitrary code execution
Debian Security
It was discovered that a programming error in the archive test mode of
cabextract, a program to extract Microsoft Cabinet files, could lead to
the execution of arbitrary code.Read more at www.criticalwatch.com
See this Amp at http://bit.ly/a7tn4J

No comments:
Post a Comment