English | Deutsch | Español | Português
 Benutzerkennung:
 Passwort:
Registrieren
 About:   Dediziert  | Erweitert  | Standard  | Wiederkehrend  | Risikolos  | Desktop  | Basis  | Einmalig  | Sicherheits Siegel  | FAQ
  Preis/Funktionszusammenfassung  | Bestellen  | Neue Anfälligkeiten  | Vertraulichkeit  | Anfälligkeiten Suche
 Anfälligkeitssuche        Suche in 75096 CVE Beschreibungen
und 39644 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.55327
Kategorie:Red Hat Local Security Checks
Titel:RedHat Security Advisory RHSA-2005:501
Zusammenfassung:Redhat Security Advisory RHSA-2005:501
Beschreibung:
The remote host is missing updates announced in
advisory RHSA-2005:501.

XFree86 is an implementation of the X Window System, which provides
the core functionality for the Linux graphical desktop.

Several integer overflow bugs were found in the way XFree86 parses pixmap
images. It is possible for a user to gain elevated privileges by loading a
specially crafted pixmap image. The Common Vulnerabilities and Exposures
project (cve.mitre.org) has assigned the name CVE-2005-2495 to this issue.

Additionally this update adds the following new features in this release:
- - Support for ATI RN50/ES1000 chipsets has been added.

The following bugs were also fixed in this release:
- - A problem with the X server's module loading system that led to cache
incoherency on the Itanium architecture.

- - The X server's PCI config space accesses caused contention
with the kernel if accesses occurred while the kernel lock was held.

- - X font server (xfs) crashed when accessing Type 1 fonts
via showfont.

- - A problem with the X transport library prevented X applications
from starting if the hostname started with a digit.

- - An issue where refresh rates were being restricted to 60Hz on
some Intel i8xx systems

Users of XFree86 should upgrade to these updated packages, which contain a
backported patch and are not vulnerable to this issue.

Solution:
Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date

http://rhn.redhat.com/errata/RHSA-2005-501.html

Risk factor : High
Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2005-2495
Debian Security Information: DSA-816 (Google Search)
http://www.debian.org/security/2005/dsa-816
http://www.securityfocus.com/archive/1/archive/1/427045/100/0/threaded
http://www.securityfocus.com/advisories/9285
http://www.securityfocus.com/advisories/9286
http://www.gentoo.org/security/en/glsa/glsa-200509-07.xml
HPdes Security Advisory: HPSBUX02137
http://www.securityfocus.com/archive/1/archive/1/442163/100/0/threaded
HPdes Security Advisory: SSRT051024
http://www.mandriva.com/security/advisories?name=MDKSA-2005:164
http://www.redhat.com/support/errata/RHSA-2005-501.html
http://www.redhat.com/support/errata/RHSA-2005-329.html
http://www.redhat.com/support/errata/RHSA-2005-396.html
SCO Security Bulletin: SCOSA-2006.22
ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.22/SCOSA-2006.22.txt
SGI Security Advisory: 20060403-01-U
ftp://patches.sgi.com/support/free/security/advisories/20060403-01-U
http://sunsolve.sun.com/search/document.do?assetkey=1-26-101953-1
http://sunsolve.sun.com/search/document.do?assetkey=1-26-101926-1
SuSE Security Announcement: SUSE-SA:2005:056 (Google Search)
http://www.novell.com/linux/security/advisories/2005_56_xserver.html
SuSE Security Announcement: SUSE-SR:2005:023 (Google Search)
http://www.novell.com/linux/security/advisories/2005_23_sr.html
http://marc.theaimsgroup.com/?l=bugtraq&m=112690609622266&w=2
http://www.securityfocus.com/advisories/9242
CERT/CC vulnerability note: VU#102441
http://www.kb.cert.org/vuls/id/102441
BugTraq ID: 14807
http://www.securityfocus.com/bid/14807
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9615
http://www.vupen.com/english/advisories/2006/3140
http://www.osvdb.org/19352
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:1044
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:998
http://securitytracker.com/id?1014887
http://secunia.com/advisories/17044
http://secunia.com/advisories/17258
http://secunia.com/advisories/17278
http://secunia.com/advisories/17215
http://secunia.com/advisories/21318
http://secunia.com/advisories/16777
http://secunia.com/advisories/16790
http://secunia.com/advisories/19624
http://secunia.com/advisories/19796
XForce ISS Database: xorg-pixmap-bo(22244)
http://xforce.iss.net/xforce/xfdb/22244
CopyrightCopyright (c) 2005 E-Soft Inc. http://www.securityspace.com

Dies ist nur einer von 39644 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.

Registrierung eines neuen Benutzers
Email:
Benutzerkennung:
Passwort:
Bitte schicken Sie mir den monatlichen Newsletter, der mich über die neuesten Services, Verbesserungen und Umfragen informiert.
Bitte schicken Sie mir eine Anfälligkeitstest Benachrichtigung, wenn ein neuer Test hinzugefügt wird.
   Datenschutz
Anmeldung für registrierte Benutzer
 
Benutzerkennung:   
Passwort:  

 Benutzerkennung oder Passwort vergessen?
Email/Benutzerkennung:




Startseite | Über uns | Kontakt | Partnerprogramme | Datenschutz | Mailinglisten | Missbrauch
Sicherheits Überprüfungen | Verwaltete DNS | Netzwerk Überwachung | Webseiten Analysator | Internet Recherche Berichte
Web Sonde | Whois

© 1998-2014 E-Soft Inc. Alle Rechte vorbehalten.