Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.121111
Kategorie:Gentoo Local Security Checks
Titel:Gentoo Security Advisory GLSA 201401-14
Zusammenfassung:Gentoo Linux Local Security Checks GLSA 201401-14
Beschreibung:Summary:
Gentoo Linux Local Security Checks GLSA 201401-14

Vulnerability Insight:
Multiple vulnerabilities have been discovered in cURL. Please review the CVE identifiers referenced below for details.

Solution:
Update the affected packages to the latest available version.

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2013-0249
1028093
http://www.securitytracker.com/id/1028093
24487
http://www.exploit-db.com/exploits/24487
57842
http://www.securityfocus.com/bid/57842
89988
http://www.osvdb.org/89988
APPLE-SA-2013-10-22-3
http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html
FEDORA-2013-2098
http://lists.fedoraproject.org/pipermail/package-announce/2013-February/099140.html
USN-1721-1
http://www.ubuntu.com/usn/USN-1721-1
http://blog.volema.com/curl-rce.html
http://curl.haxx.se/docs/adv_20130206.html
http://nakedsecurity.sophos.com/2013/02/10/anatomy-of-a-vulnerability-curl-web-download-toolkit-holed-by-authentication-bug/
http://packetstormsecurity.com/files/120147/cURL-Buffer-Overflow.html
http://packetstormsecurity.com/files/120170/Slackware-Security-Advisory-curl-Updates.html
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
Common Vulnerability Exposure (CVE) ID: CVE-2013-1944
BugTraq ID: 59058
http://www.securityfocus.com/bid/59058
Debian Security Information: DSA-2660 (Google Search)
http://www.debian.org/security/2012/dsa-2660
http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102711.html
http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102056.html
http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104598.html
http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104207.html
http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106606.html
http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105539.html
http://www.mandriva.com/security/advisories?name=MDVSA-2013:151
https://bugzilla.redhat.com/show_bug.cgi?id=950577
https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0121
http://www.osvdb.org/92316
RedHat Security Advisories: RHSA-2013:0771
http://rhn.redhat.com/errata/RHSA-2013-0771.html
http://secunia.com/advisories/53044
http://secunia.com/advisories/53051
http://secunia.com/advisories/53097
SuSE Security Announcement: openSUSE-SU-2013:0876 (Google Search)
http://lists.opensuse.org/opensuse-updates/2013-06/msg00013.html
SuSE Security Announcement: openSUSE-SU-2013:0879 (Google Search)
http://lists.opensuse.org/opensuse-updates/2013-06/msg00016.html
http://www.ubuntu.com/usn/USN-1801-1
Common Vulnerability Exposure (CVE) ID: CVE-2013-2174
BugTraq ID: 60737
http://www.securityfocus.com/bid/60737
Debian Security Information: DSA-2713 (Google Search)
http://www.debian.org/security/2013/dsa-2713
RedHat Security Advisories: RHSA-2013:0983
http://rhn.redhat.com/errata/RHSA-2013-0983.html
SuSE Security Announcement: openSUSE-SU-2013:1133 (Google Search)
http://lists.opensuse.org/opensuse-updates/2013-07/msg00013.html
http://www.ubuntu.com/usn/USN-1894-1
Common Vulnerability Exposure (CVE) ID: CVE-2013-6422
Debian Security Information: DSA-2824 (Google Search)
http://www.debian.org/security/2013/dsa-2824
HPdes Security Advisory: HPSBMU03112
https://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04463322
http://www.ubuntu.com/usn/USN-2058-1
CopyrightCopyright (C) 2015 Eero Volotinen

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.