Fedora 13 : kvirc-4.0.0-1.fc13 (2010-10522)

Critical Nessus Plugin ID 47564


The remote Fedora host is missing a security update.


KVIrc 4.0.0 Notable new features of this release include: - Definitive and stable port to the Qt4 libraries - Better support for server tecnologies: CAPS, STARTTLS, SASL, irc services... - A new UPnP module to control and remotely map your router ports for DCC - A totally rewritten MDI subsystem, with the look and feel of your OS - A nice graphical addon packager - A visual class editor for object oriented scripting - A rewritten iograph module to check your bandwidth usage - Support for animated avatars - Ability to get other user's avatars/information without the need to CTCP the whole channel - Support for DBus inter-process communication - Support for the MPRIS media player control and info reporting - Support for Phonon direct media playback - A lot of new options to better customize your client
- A lot of new KVS commands and functions for your scripting needs More details here:
http://www.kvirc.net/?id=news&story=2010. t

Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.


Update the affected kvirc package.

See Also




Plugin Details

Severity: Critical

ID: 47564

File Name: fedora_2010-10522.nasl

Version: $Revision: 1.9 $

Type: local

Agent: unix

Published: 2010/07/01

Modified: 2015/10/20

Dependencies: 12634

Risk Information

Risk Factor: Critical


Base Score: 10

Temporal Score: 8.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:fedoraproject:fedora:kvirc, cpe:/o:fedoraproject:fedora:13

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2010/06/28

Reference Information

CVE: CVE-2010-2451, CVE-2010-2452

BID: 40746

OSVDB: 65858, 65859

FEDORA: 2010-10522