Startseite ▼ Bookkeeping
Online ▼ Sicherheits
Überprüfungs ▼
Verwaltetes
DNS ▼
Info
Bestellen/Erneuern
FAQ
AUP
Dynamic DNS Clients
Domaine konfigurieren Dyanmic DNS Update Password Netzwerk
Überwachung ▼
Enterprise
Erweiterte
Standard
Gratis Test
FAQ
Preis/Funktionszusammenfassung
Bestellen
Beispiele
Konfigurieren/Status Alarm Profile | |||
Test Kennung: | 1.3.6.1.4.1.25623.1.0.53748 |
Kategorie: | Debian Local Security Checks |
Titel: | Debian Security Advisory DSA 695-1 (xli) |
Zusammenfassung: | NOSUMMARY |
Beschreibung: | Description: The remote host is missing an update to xli announced via advisory DSA 695-1. Several vulnerabilities have been discovered in xli, an image viewer for X11. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2001-0775 A buffer overflow in the decoder for FACES format images could be exploited by an attacker to execute arbitrary code. This problem has been fixed in xloadimage in DSA 069 already. CVE-2005-0638 Tavis Ormandy of the Gentoo Linux Security Audit Team has reported a flaw in the handling of compressed images, where shell meta-characters are not adequately escaped. CVE-2005-0639 Insufficient validation of image properties in have been discovered which could potentially result in buffer management errors. For the stable distribution (woody) these problems have been fixed in version 1.17.0-11woody1. For the unstable distribution (sid) these problems have been fixed in version 1.17.0-18. We recommend that you upgrade your xli package. Solution: http://www.securityspace.com/smysecure/catid.html?in=DSA%20695-1 CVSS Score: 7.5 CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P |
Querverweis: |
BugTraq ID: 3006 Common Vulnerability Exposure (CVE) ID: CVE-2001-0775 http://www.securityfocus.com/bid/3006 Bugtraq: 20010710 xloadimage remote exploit - tstot.c (Google Search) http://www.securityfocus.com/archive/1/195823 Debian Security Information: DSA-069 (Google Search) http://www.debian.org/security/2001/dsa-069 Debian Security Information: DSA-695 (Google Search) http://www.debian.org/security/2005/dsa-695 http://www.gentoo.org/security/en/glsa/glsa-200503-05.xml http://www.redhat.com/support/errata/RHSA-2001-088.html SuSE Security Announcement: SA:2001:024 (Google Search) http://www.novell.com/linux/security/advisories/2001_024_xli_txt.html http://www.iss.net/security_center/static/6821.php Common Vulnerability Exposure (CVE) ID: CVE-2005-0638 BugTraq ID: 12712 http://www.securityfocus.com/bid/12712 http://www.securityfocus.com/archive/1/433935/30/5010/threaded http://security.gentoo.org/glsa/glsa-200503-05.xml http://www.osvdb.org/14365 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10898 http://www.redhat.com/support/errata/RHSA-2005-332.html http://secunia.com/advisories/14459 http://secunia.com/advisories/14462 Common Vulnerability Exposure (CVE) ID: CVE-2005-0639 |
Copyright | Copyright (c) 2005 E-Soft Inc. http://www.securityspace.com |
Dies ist nur einer von 99761 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus. Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten. |