Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.52099
Kategorie:Mandrake Local Security Checks
Titel:Mandrake Security Advisory MDKSA-2005:076 (xli)
Zusammenfassung:NOSUMMARY
Beschreibung:Description:

The remote host is missing an update to xli
announced via advisory MDKSA-2005:076.

A number of vulnerabilities have been found in the xli image viewer.
Tavis Ormandy of the Gentoo Linux Security Audit Team discovered a flaw
in the handling of compressed images where shell meta-characters are
not properly escaped (CVE-2005-0638). It was also found that
insufficient validation of image properties could potentially result
in buffer management errors (CVE-2005-0639).

The updated packages have been patched to correct these problems.

Affected versions: 10.1, 10.2, Corporate 3.0,
Corporate Server 2.1


Solution:
To upgrade automatically use MandrakeUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

http://www.securityspace.com/smysecure/catid.html?in=MDKSA-2005:076

Risk factor : High

CVSS Score:
7.5

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2005-0638
BugTraq ID: 12712
http://www.securityfocus.com/bid/12712
Debian Security Information: DSA-695 (Google Search)
http://www.debian.org/security/2005/dsa-695
http://www.securityfocus.com/archive/1/433935/30/5010/threaded
http://security.gentoo.org/glsa/glsa-200503-05.xml
http://www.osvdb.org/14365
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10898
http://www.redhat.com/support/errata/RHSA-2005-332.html
http://secunia.com/advisories/14459
http://secunia.com/advisories/14462
Common Vulnerability Exposure (CVE) ID: CVE-2005-0639
CopyrightCopyright (c) 2005 E-Soft Inc. http://www.securityspace.com

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.