Advisories
Mandriva Advisories
|
![]() |
Problem Description |
Multiple unspecified vulnerabilities in the "utf8 combining characters
handling" (utf8_handle_comb function in encoding.c) in screen before
4.0.3 allows user-assisted attackers to cause a denial of service
(crash or hang) via certain UTF8 sequences.
Updated packages have been patched to correct this issue.
Updated Packages |
Corporate Server 3.0
7e82b9ca9f4cb7d36c3effff9f9a6c9b corporate/3.0/i586/screen-4.0.2-1.1.C30mdk.i586.rpm 8f03ad99709f5346b995492a749e4bfc corporate/3.0/SRPMS/screen-4.0.2-1.1.C30mdk.src.rpm
Corporate Server 3.0/X86_64
848ef4b41455884c8af2faaf8b3e415a corporate/3.0/x86_64/screen-4.0.2-1.1.C30mdk.x86_64.rpm 8f03ad99709f5346b995492a749e4bfc corporate/3.0/SRPMS/screen-4.0.2-1.1.C30mdk.src.rpm
Mandriva Linux 2006
9e8eaea4477898e374bb25347282cfd1 2006.0/i586/screen-4.0.2-6.1.20060mdk.i586.rpm eca09b0f931ca48e48ce41608a188e01 2006.0/SRPMS/screen-4.0.2-6.1.20060mdk.src.rpm
Mandriva Linux 2006/X86_64
c00635f995a854a72e8c372c8464d960 2006.0/x86_64/screen-4.0.2-6.1.20060mdk.x86_64.rpm eca09b0f931ca48e48ce41608a188e01 2006.0/SRPMS/screen-4.0.2-6.1.20060mdk.src.rpm
Mandriva Linux 2007
945203a197c7e5517be01ee32e5eebcc 2007.0/i586/screen-4.0.2-9.1mdv2007.0.i586.rpm 4e8453bfc592055a3b62b1be19a564f9 2007.0/SRPMS/screen-4.0.2-9.1mdv2007.0.src.rpm
Mandriva Linux 2007/X86_64
e9ca78a213aa19bcc48546e06715e4be 2007.0/x86_64/screen-4.0.2-9.1mdv2007.0.x86_64.rpm 4e8453bfc592055a3b62b1be19a564f9 2007.0/SRPMS/screen-4.0.2-9.1mdv2007.0.src.rpm
Corporate Server 4.0
b8291d07e76adc2dd872fc1456f63340 corporate/4.0/i586/screen-4.0.2-6.1.20060mlcs4.i586.rpm a63794f38d2898c38f23b0d124baf649 corporate/4.0/SRPMS/screen-4.0.2-6.1.20060mlcs4.src.rpm
Corporate Server 4.0/X86_64
8597118cdb7fa7c052e8d190469d99cc corporate/4.0/x86_64/screen-4.0.2-6.1.20060mlcs4.x86_64.rpm a63794f38d2898c38f23b0d124baf649 corporate/4.0/SRPMS/screen-4.0.2-6.1.20060mlcs4.src.rpm
References |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4573
Upgrade |
To upgrade automatically, use MandrivaUpdate.
Verification |
Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command :
rpm --checksig package.rpm
You can get the GPG public key of the Mandriva Security Team to verify the GPG signature of each RPM.
If you use MandrivaUpdate, the verification of md5 checksum and GPG signature is performed automatically for you.