exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Secunia Security Advisory 17212

Secunia Security Advisory 17212
Posted Oct 18, 2005
Authored by Secunia | Site secunia.com

Secunia Security Advisory - Fedora has issue an update for koffice. This fixes a vulnerability, which can be exploited by malicious people to compromise a user's system.

tags | advisory
systems | linux, fedora
SHA-256 | 411db59a83c589fdcbd846ccd05ff5af4838c3f2ba96fc6c785b5c5256e63813

Secunia Security Advisory 17212

Change Mirror Download


TITLE:
Fedora update for koffice

SECUNIA ADVISORY ID:
SA17212

VERIFY ADVISORY:
http://secunia.com/advisories/17212/

CRITICAL:
Highly critical

IMPACT:
System access

WHERE:
>From remote

OPERATING SYSTEM:
Fedora Core 3
http://secunia.com/product/4222/

DESCRIPTION:
Fedora has issue an update for koffice. This fixes a vulnerability,
which can be exploited by malicious people to compromise a user's
system.

For more information:
SA17145

SOLUTION:
Apply updated packages.

Fedora Core 3:
http://download.fedora.redhat.com/pub/fedora/linux/core/updates/3/

bafe97fb7281f5426b3083724e322ea0
SRPMS/koffice-1.4.2-0.FC3.2.src.rpm
e15514c10895f145a86f4c9f9705280e
x86_64/koffice-1.4.2-0.FC3.2.x86_64.rpm
deabe85c27ee8e64222852e9102353ea
x86_64/koffice-devel-1.4.2-0.FC3.2.x86_64.rpm
fee6bd39288102e654472e8eeef7eae7
x86_64/koffice-i18n-1.4.2-0.FC3.2.x86_64.rpm
277f7d7ac321494caea1f3ebac286c6c
x86_64/debug/koffice-debuginfo-1.4.2-0.FC3.2.x86_64.rpm
37dc3bd085181b7358847cc9f83baa9a
i386/koffice-1.4.2-0.FC3.2.i386.rpm
aa952fabd7e68535b8d9990beaab6a8c
i386/koffice-devel-1.4.2-0.FC3.2.i386.rpm
1618a08fea088e2feade1eb04020bd88
i386/koffice-i18n-1.4.2-0.FC3.2.i386.rpm
5ff5c11941786261c73bf8f35a97afa4
i386/debug/koffice-debuginfo-1.4.2-0.FC3.2.i386.rpm

OTHER REFERENCES:
SA17145:
http://secunia.com/advisories/17145/

----------------------------------------------------------------------

About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/


Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.

----------------------------------------------------------------------

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    16 Files
  • 26
    Apr 26th
    14 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close