Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.130105
Kategorie:Mageia Linux Local Security Checks
Titel:Mageia: Security Advisory (MGASA-2015-0273)
Zusammenfassung:The remote host is missing an update for the 'flash-player-plugin' package(s) announced via the MGASA-2015-0273 advisory.
Beschreibung:Summary:
The remote host is missing an update for the 'flash-player-plugin' package(s) announced via the MGASA-2015-0273 advisory.

Vulnerability Insight:
Adobe Flash Player 11.2.202.481 contains fixes to critical security
vulnerabilities found in earlier versions that could potentially allow an
attacker to take control of the affected system.

Adobe is aware of a report that an exploit targeting CVE-2015-5119 has
been publicly published.

This updates resolves heap buffer overflow vulnerabilities that could lead
to code execution (CVE-2015-3135, CVE-2015-4432, CVE-2015-5118).

This updates resolves memory corruption vulnerabilities that could lead to
code execution (CVE-2015-3117, CVE-2015-3123, CVE-2015-3130,
CVE-2015-3133, CVE-2015-3134, CVE-2015-4431).

This updates resolves null pointer dereference issues (CVE-2015-3126,
CVE-2015-4429).

This updates resolves a security bypass vulnerability that could lead to
information disclosure (CVE-2015-3114).

This updates resolves type confusion vulnerabilities that could lead to
code execution (CVE-2015-3119, CVE-2015-3120, CVE-2015-3121,
CVE-2015-3122, CVE-2015-4433).

This updates resolves use-after-free vulnerabilities that could lead to
code execution (CVE-2015-3118, CVE-2015-3124, CVE-2015-5117,
CVE-2015-3127, CVE-2015-3128, CVE-2015-3129, CVE-2015-3131, CVE-2015-3132,
CVE-2015-3136, CVE-2015-3137, CVE-2015-4428, CVE-2015-4430, CVE-2015-5119).

This updates resolves vulnerabilities that could be exploited to bypass
the same-origin-policy and lead to information disclosure (CVE-2014-0578,
CVE-2015-3115, CVE-2015-3116, CVE-2015-3125, CVE-2015-5116).

Affected Software/OS:
'flash-player-plugin' package(s) on Mageia 4, Mageia 5.

Solution:
Please install the updated package(s).

CVSS Score:
10.0

CVSS Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2014-0578
BugTraq ID: 75594
http://www.securityfocus.com/bid/75594
https://security.gentoo.org/glsa/201507-13
RedHat Security Advisories: RHSA-2015:1214
http://rhn.redhat.com/errata/RHSA-2015-1214.html
http://www.securitytracker.com/id/1032810
SuSE Security Announcement: SUSE-SU-2015:1211 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00017.html
SuSE Security Announcement: SUSE-SU-2015:1214 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00018.html
Common Vulnerability Exposure (CVE) ID: CVE-2015-3114
BugTraq ID: 75593
http://www.securityfocus.com/bid/75593
Common Vulnerability Exposure (CVE) ID: CVE-2015-3115
Common Vulnerability Exposure (CVE) ID: CVE-2015-3116
Common Vulnerability Exposure (CVE) ID: CVE-2015-3117
BugTraq ID: 75591
http://www.securityfocus.com/bid/75591
Common Vulnerability Exposure (CVE) ID: CVE-2015-3118
BugTraq ID: 75590
http://www.securityfocus.com/bid/75590
https://www.exploit-db.com/exploits/37848/
Common Vulnerability Exposure (CVE) ID: CVE-2015-3119
BugTraq ID: 75595
http://www.securityfocus.com/bid/75595
Common Vulnerability Exposure (CVE) ID: CVE-2015-3120
Common Vulnerability Exposure (CVE) ID: CVE-2015-3121
Common Vulnerability Exposure (CVE) ID: CVE-2015-3122
Common Vulnerability Exposure (CVE) ID: CVE-2015-3123
Common Vulnerability Exposure (CVE) ID: CVE-2015-3124
https://www.exploit-db.com/exploits/37849/
Common Vulnerability Exposure (CVE) ID: CVE-2015-3125
Common Vulnerability Exposure (CVE) ID: CVE-2015-3126
BugTraq ID: 75596
http://www.securityfocus.com/bid/75596
Common Vulnerability Exposure (CVE) ID: CVE-2015-3127
Common Vulnerability Exposure (CVE) ID: CVE-2015-3128
Common Vulnerability Exposure (CVE) ID: CVE-2015-3129
Common Vulnerability Exposure (CVE) ID: CVE-2015-3130
Common Vulnerability Exposure (CVE) ID: CVE-2015-3131
Common Vulnerability Exposure (CVE) ID: CVE-2015-3132
Common Vulnerability Exposure (CVE) ID: CVE-2015-3133
Common Vulnerability Exposure (CVE) ID: CVE-2015-3134
https://www.exploit-db.com/exploits/37862/
Common Vulnerability Exposure (CVE) ID: CVE-2015-3135
BugTraq ID: 75592
http://www.securityfocus.com/bid/75592
Common Vulnerability Exposure (CVE) ID: CVE-2015-3136
Common Vulnerability Exposure (CVE) ID: CVE-2015-3137
Common Vulnerability Exposure (CVE) ID: CVE-2015-4428
Common Vulnerability Exposure (CVE) ID: CVE-2015-4429
Common Vulnerability Exposure (CVE) ID: CVE-2015-4430
Common Vulnerability Exposure (CVE) ID: CVE-2015-4431
Common Vulnerability Exposure (CVE) ID: CVE-2015-4432
Common Vulnerability Exposure (CVE) ID: CVE-2015-4433
Common Vulnerability Exposure (CVE) ID: CVE-2015-5116
https://www.exploit-db.com/exploits/37851/
Common Vulnerability Exposure (CVE) ID: CVE-2015-5117
Common Vulnerability Exposure (CVE) ID: CVE-2015-5118
Common Vulnerability Exposure (CVE) ID: CVE-2015-5119
BugTraq ID: 75568
http://www.securityfocus.com/bid/75568
Cert/CC Advisory: TA15-195A
http://www.us-cert.gov/ncas/alerts/TA15-195A
CERT/CC vulnerability note: VU#561288
http://www.kb.cert.org/vuls/id/561288
http://blog.trendmicro.com/trendlabs-security-intelligence/unpatched-flash-player-flaws-more-pocs-found-in-hacking-team-leak/
http://twitter.com/w3bd3vil/statuses/618168863708962816
http://www.rapid7.com/db/modules/exploit/multi/browser/adobe_flash_hacking_team_uaf
https://packetstormsecurity.com/files/132600/Adobe-Flash-Player-ByteArray-Use-After-Free.html
http://www.securitytracker.com/id/1032809
SuSE Security Announcement: openSUSE-SU-2015:1207 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00015.html
SuSE Security Announcement: openSUSE-SU-2015:1210 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00016.html
CopyrightCopyright (C) 2015 Greenbone AG

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.