Lucene search

K

[SECURITY] [DSA 834-1] New prozilla packages fix arbitrary code execution

🗓️ 01 Oct 2005 06:07:54Reported by DebianType 
debian
 debian
🔗 lists.debian.org👁 6 Views

The prozilla package in Debian is vulnerable to a remote arbitrary code execution due to a buffer overflow and is fixed by upgrading to version 1.3.6-3woody3

Show more
Related
Packages
OSOS VersionArchitecturePackagePackage VersionFilename
Debian3hppaprozilla1:1.3.6-3woody3prozilla_1:1.3.6-3woody3_hppa.deb
Debian3i386prozilla1:1.3.6-3woody3prozilla_1:1.3.6-3woody3_i386.deb
Debian3mipsprozilla1:1.3.6-3woody3prozilla_1:1.3.6-3woody3_mips.deb
Debian3m68kprozilla1:1.3.6-3woody3prozilla_1:1.3.6-3woody3_m68k.deb
Debian3alphaprozilla1:1.3.6-3woody3prozilla_1:1.3.6-3woody3_alpha.deb
Debian3mipselprozilla1:1.3.6-3woody3prozilla_1:1.3.6-3woody3_mipsel.deb
Debian3powerpcprozilla1:1.3.6-3woody3prozilla_1:1.3.6-3woody3_powerpc.deb
Debian3allprozilla1:1.3.6-3woody3prozilla_1:1.3.6-3woody3_all.deb
Debian3armprozilla1:1.3.6-3woody3prozilla_1:1.3.6-3woody3_arm.deb
Debian3s390prozilla1:1.3.6-3woody3prozilla_1:1.3.6-3woody3_s390.deb
Rows per page

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
01 Oct 2005 06:54Current
6.6Medium risk
Vulners AI Score6.6
CVSS27.5
EPSS0.015
6
.json
Report