Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.55316
Kategorie:Conectiva Local Security Checks
Titel:Conectiva Security Advisory CLSA-2005:1007
Zusammenfassung:NOSUMMARY
Beschreibung:Description:

The remote host is missing updates announced in
advisory CLSA-2005:1007.

netpbm are tools for manipulating graphic files in
many formats.

pstopnm did not properly use the '-dSAFER' option when
calling Ghostscript to convert a PostScript file into
a PBM, PGM, or PNM file, which allows remote attackers
to execute arbitrary commands.

Solution:
The apt tool can be used to perform RPM package upgrades
by running 'apt-get update' followed by 'apt-get upgrade'

http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=001007
http://netpbm.sourceforge.net/

Risk factor : High

CVSS Score:
7.5

Querverweis: BugTraq ID: 14379
Common Vulnerability Exposure (CVE) ID: CVE-2005-2471
http://www.securityfocus.com/bid/14379
Debian Security Information: DSA-1021 (Google Search)
http://www.debian.org/security/2006/dsa-1021
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=319757
http://www.osvdb.org/18253
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11645
http://www.redhat.com/support/errata/RHSA-2005-743.html
http://securitytracker.com/id?1014752
http://secunia.com/advisories/16184
http://secunia.com/advisories/18330
http://secunia.com/advisories/19436
SuSE Security Announcement: SUSE-SR:2005:019 (Google Search)
http://www.novell.com/linux/security/advisories/2005_19_sr.html
http://www.trustix.org/errata/2005/0038/
XForce ISS Database: netpbm-dsafer-command-execution(21500)
https://exchange.xforce.ibmcloud.com/vulnerabilities/21500
CopyrightCopyright (c) 2005 E-Soft Inc. http://www.securityspace.com

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.