Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.131280
Kategorie:Mageia Linux Local Security Checks
Titel:Mageia: Security Advisory (MGASA-2016-0118)
Zusammenfassung:The remote host is missing an update for the 'filezilla, libfilezilla, pugixml' package(s) announced via the MGASA-2016-0118 advisory.
Beschreibung:Summary:
The remote host is missing an update for the 'filezilla, libfilezilla, pugixml' package(s) announced via the MGASA-2016-0118 advisory.

Vulnerability Insight:
Many versions of PSCP in PuTTY prior to 0.67 have a stack corruption
vulnerability in their treatment of the 'sink' direction (i.e. downloading
from server to client) of the old-style SCP protocol. In order for this
vulnerability to be exploited, the user must connect to a malicious server
and attempt to download any file (CVE-2016-2563).

FileZilla was vulnerable to this issue as it bundles a copy of PuTTY. The
filezilla package has been updated to version 3.16.1, which fixes this
issue and has many other fixes and enhancements.

Affected Software/OS:
'filezilla, libfilezilla, pugixml' package(s) on Mageia 5.

Solution:
Please install the updated package(s).

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2016-2563
BugTraq ID: 84296
http://www.securityfocus.com/bid/84296
http://seclists.org/fulldisclosure/2016/Mar/22
https://security.gentoo.org/glsa/201606-01
https://github.com/tintinweb/pub/tree/master/pocs/cve-2016-2563
http://www.securitytracker.com/id/1035257
SuSE Security Announcement: openSUSE-SU-2016:1453 (Google Search)
http://lists.opensuse.org/opensuse-updates/2016-05/msg00131.html
CopyrightCopyright (C) 2016 Greenbone AG

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.