![]() |
Startseite ▼ Bookkeeping
Online ▼ Sicherheits
Überprüfungs ▼
Verwaltetes
DNS ▼
Info
Bestellen/Erneuern
FAQ
AUP
Dynamic DNS Clients
Domaine konfigurieren Dyanmic DNS Update Password Netzwerk
Überwachung ▼
Enterprise
Erweiterte
Standard
Gratis Test
FAQ
Preis/Funktionszusammenfassung
Bestellen
Beispiele
Konfigurieren/Status Alarm Profile | ||
Test Kennung: | 1.3.6.1.4.1.25623.1.0.131280 |
Kategorie: | Mageia Linux Local Security Checks |
Titel: | Mageia: Security Advisory (MGASA-2016-0118) |
Zusammenfassung: | The remote host is missing an update for the 'filezilla, libfilezilla, pugixml' package(s) announced via the MGASA-2016-0118 advisory. |
Beschreibung: | Summary: The remote host is missing an update for the 'filezilla, libfilezilla, pugixml' package(s) announced via the MGASA-2016-0118 advisory. Vulnerability Insight: Many versions of PSCP in PuTTY prior to 0.67 have a stack corruption vulnerability in their treatment of the 'sink' direction (i.e. downloading from server to client) of the old-style SCP protocol. In order for this vulnerability to be exploited, the user must connect to a malicious server and attempt to download any file (CVE-2016-2563). FileZilla was vulnerable to this issue as it bundles a copy of PuTTY. The filezilla package has been updated to version 3.16.1, which fixes this issue and has many other fixes and enhancements. Affected Software/OS: 'filezilla, libfilezilla, pugixml' package(s) on Mageia 5. Solution: Please install the updated package(s). CVSS Score: 7.5 CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P |
Querverweis: |
Common Vulnerability Exposure (CVE) ID: CVE-2016-2563 BugTraq ID: 84296 http://www.securityfocus.com/bid/84296 http://seclists.org/fulldisclosure/2016/Mar/22 https://security.gentoo.org/glsa/201606-01 https://github.com/tintinweb/pub/tree/master/pocs/cve-2016-2563 http://www.securitytracker.com/id/1035257 SuSE Security Announcement: openSUSE-SU-2016:1453 (Google Search) http://lists.opensuse.org/opensuse-updates/2016-05/msg00131.html |
Copyright | Copyright (C) 2016 Greenbone AG |
Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus. Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten. |