English | Deutsch | Español | Português
 Benutzerkennung:
 Passwort:
Registrieren
 About:   Dediziert  | Erweitert  | Standard  | Wiederkehrend  | Risikolos  | Desktop  | Basis  | Einmalig  | Sicherheits Siegel  | FAQ
  Preis/Funktionszusammenfassung  | Bestellen  | Neue Anfälligkeiten  | Vertraulichkeit  | Anfälligkeiten Suche
 Anfälligkeitssuche        Suche in 75803 CVE Beschreibungen
und 40037 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.56153
Kategorie:Trustix Local Security Checks
Titel:Trustix Security Advisory TSLSA-2006-0002 (Multiple packages)
Zusammenfassung:Trustix Security Advisory TSLSA-2006-0002 (Multiple packages)
Beschreibung:
The remote host is missing updates announced in
advisory TSLSA-2006-0002.

clamav < TSL 3.0 > < TSL 2.2 >
- New Upstream.
- SECURITY Fix: Fixes possible heap based buffer overflow in libclamav/upx.c.

The Common Vulnerabilities and Exposures project has assigned the
name CVE-2006-0162 to this issue.

cups < TSL 3.0 > < TSL 2.2 > < TSEL 2 >
- SECURITY Fix: Chris Evans has reported some vulnerabilities in xpdf,
which can be exploited by malicious people to cause a DoS.
- Integer overflow error exists in Stream.cc:StreamPredictor::StreamPredictor()
and Stream.cc::CCITTFaxStream::CCITTFaxStream() when calculating buffer
sizes for memory allocation. This can potentially be exploited to
overflow the allocated heap memory.
- An infinite loop error exists in Stream.cc::DCTStream::readMarker()
when handling certain malformed input files. This can potentially be
exploited to cause a DoS.
- Missing validation of input parameters in
Stream.cc:DCTStream::readHuffmanTables() and
Stream.cc:DCTStream::readScanInfo() can cause out-of-bounds memory access.
This can potentially be exploited to overwrite certain memory.
- Some potential integer overflow error exists in JBIG2Stream.cc.

The Common Vulnerabilities and Exposures project has assigned the
name CVE-2005-3624, CVE-2005-3625, CVE-2005-3626 and CVE-2005-3627
to these issues.

fetchmail < TSL 3.0 > < TSL 2.2 >
- New Upstream.
- SECURITY Fix: A vulnerability has been reported in Fetchmail caused due
to a null pointer dereferencing error when handling a message without
email headers. This can be exploited to crash Fetchmail when the
upstream mail server sends a message without headers.

The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the name CVE-2005-4348 to this issue.

mod_auth_pgsql < TSL 3.0 >
- New Upstream.
- SECURITY Fix: iDEFENSE has reported a format string flaw in
mod_auth_pgsql. This could allow a remote unauthenticated attacker to
execute arbitrary code as the httpd process.

The Common Vulnerabilities and Exposures project has assigned the
name CVE-2005-3656 to this issue.

sudo < TSL 3.0 > < TSL 2.2 > < TSEL 2 >
- SECURITY FIX: A vulnerability has been reported in Sudo caused due to
an error within the environment cleaning. This can be exploited by a
user with sudo access to a perl script to load and execute arbitrary
library files via the PERLLIB, PERL5LIB and the PERL5OPT
environment variables.

The Common Vulnerabilities and Exposures project has assigned the
name CVE-2005-4158 to this issue.

Solution:
Update your system with the packages as indicated in
the referenced security advisory.

http://www.securityspace.com/smysecure/catid.html?in=TSLSA-2006-0002

Risk factor : Critical
Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2006-0162
http://lists.grok.org.uk/pipermail/full-disclosure/2006-January/041325.html
http://www.zerodayinitiative.com/advisories/ZDI-06-001.html
Debian Security Information: DSA-947 (Google Search)
http://www.debian.org/security/2006/dsa-947
http://www.gentoo.org/security/en/glsa/glsa-200601-07.xml
http://www.mandriva.com/security/advisories?name=MDKSA-2006:016
http://www.trustix.org/errata/2006/0002/
CERT/CC vulnerability note: VU#385908
http://www.kb.cert.org/vuls/id/385908
BugTraq ID: 16191
http://www.securityfocus.com/bid/16191
http://www.vupen.com/english/advisories/2006/0116
http://www.osvdb.org/22318
http://securitytracker.com/id?1015457
http://secunia.com/advisories/18379
http://secunia.com/advisories/18453
http://secunia.com/advisories/18478
http://secunia.com/advisories/18548
http://secunia.com/advisories/18463
http://securityreason.com/securityalert/342
XForce ISS Database: clamav-libclamav-upx-bo(24047)
http://xforce.iss.net/xforce/xfdb/24047
Common Vulnerability Exposure (CVE) ID: CVE-2005-3624
http://scary.beasts.org/security/CESA-2005-003.txt
Debian Security Information: DSA-931 (Google Search)
http://www.debian.org/security/2005/dsa-931
Debian Security Information: DSA-932 (Google Search)
http://www.debian.org/security/2005/dsa-932
Debian Security Information: DSA-937 (Google Search)
http://www.debian.org/security/2005/dsa-937
Debian Security Information: DSA-938 (Google Search)
http://www.debian.org/security/2005/dsa-938
Debian Security Information: DSA-940 (Google Search)
http://www.debian.org/security/2005/dsa-940
Debian Security Information: DSA-936 (Google Search)
http://www.debian.org/security/2006/dsa-936
Debian Security Information: DSA-950 (Google Search)
http://www.debian.org/security/2006/dsa-950
Debian Security Information: DSA-961 (Google Search)
http://www.debian.org/security/2006/dsa-961
Debian Security Information: DSA-962 (Google Search)
http://www.debian.org/security/2006/dsa-962
http://www.securityfocus.com/archive/1/archive/1/427990/100/0/threaded
http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00030.html
http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00031.html
http://www.securityfocus.com/archive/1/archive/1/427053/100/0/threaded
http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml
http://www.gentoo.org/security/en/glsa/glsa-200601-17.xml
http://www.mandriva.com/security/advisories?name=MDKSA-2006:010
http://www.mandriva.com/security/advisories?name=MDKSA-2006:003
http://www.mandriva.com/security/advisories?name=MDKSA-2006:004
http://www.mandriva.com/security/advisories?name=MDKSA-2006:005
http://www.mandriva.com/security/advisories?name=MDKSA-2006:006
http://www.mandriva.com/security/advisories?name=MDKSA-2006:008
http://www.mandriva.com/security/advisories?name=MDKSA-2006:012
http://www.mandriva.com/security/advisories?name=MDKSA-2006:011
RedHat Security Advisories: RHSA-2006:0177
http://rhn.redhat.com/errata/RHSA-2006-0177.html
http://www.redhat.com/support/errata/RHSA-2006-0160.html
http://www.redhat.com/support/errata/RHSA-2006-0163.html
SCO Security Bulletin: SCOSA-2006.15
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt
SGI Security Advisory: 20051201-01-U
ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U
SGI Security Advisory: 20060101-01-U
ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U
SGI Security Advisory: 20060201-01-U
ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1
SuSE Security Announcement: SUSE-SA:2006:001 (Google Search)
http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html
http://www.ubuntulinux.org/support/documentation/usn/usn-236-1
BugTraq ID: 16143
http://www.securityfocus.com/bid/16143
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9437
http://www.vupen.com/english/advisories/2006/0047
http://www.vupen.com/english/advisories/2007/2280
http://secunia.com/advisories/18303
http://secunia.com/advisories/18312
http://secunia.com/advisories/18313
http://secunia.com/advisories/18329
http://secunia.com/advisories/18332
http://secunia.com/advisories/18334
http://secunia.com/advisories/18387
http://secunia.com/advisories/18416
http://secunia.com/advisories/18338
http://secunia.com/advisories/18349
http://secunia.com/advisories/18375
http://secunia.com/advisories/18385
http://secunia.com/advisories/18389
http://secunia.com/advisories/18423
http://secunia.com/advisories/18448
http://secunia.com/advisories/18398
http://secunia.com/advisories/18407
http://secunia.com/advisories/18534
http://secunia.com/advisories/18582
http://secunia.com/advisories/18517
http://secunia.com/advisories/18554
http://secunia.com/advisories/18642
http://secunia.com/advisories/18644
http://secunia.com/advisories/18674
http://secunia.com/advisories/18675
http://secunia.com/advisories/18679
http://secunia.com/advisories/18908
http://secunia.com/advisories/18913
http://secunia.com/advisories/19230
http://secunia.com/advisories/19377
http://secunia.com/advisories/18425
http://secunia.com/advisories/18147
http://secunia.com/advisories/18373
http://secunia.com/advisories/18380
http://secunia.com/advisories/18414
http://secunia.com/advisories/18428
http://secunia.com/advisories/18436
http://secunia.com/advisories/25729
XForce ISS Database: xpdf-ccitt-faxstream-bo(24022)
http://xforce.iss.net/xforce/xfdb/24022
Common Vulnerability Exposure (CVE) ID: CVE-2005-3625
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9575
http://secunia.com/advisories/18335
XForce ISS Database: xpdf-ccittfaxdecode-dctdecode-dos(24023)
http://xforce.iss.net/xforce/xfdb/24023
Common Vulnerability Exposure (CVE) ID: CVE-2005-3626
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9992
XForce ISS Database: xpdf-flatedecode-dos(24026)
http://xforce.iss.net/xforce/xfdb/24026
Common Vulnerability Exposure (CVE) ID: CVE-2005-3627
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10200
XForce ISS Database: xpdf-readhuffmantables-bo(24024)
http://xforce.iss.net/xforce/xfdb/24024
XForce ISS Database: xpdf-readscaninfo-bo(24025)
http://xforce.iss.net/xforce/xfdb/24025
Common Vulnerability Exposure (CVE) ID: CVE-2005-4348
Bugtraq: 20051221 fetchmail security announcement fetchmail-SA-2005-03 (CVE-2005-4348) (Google Search)
http://www.securityfocus.com/archive/1/archive/1/420098/100/0/threaded
Bugtraq: 20060526 rPSA-2006-0084-1 fetchmail (Google Search)
http://www.securityfocus.com/archive/1/archive/1/435197/100/0/threaded
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=343836
Debian Security Information: DSA-939 (Google Search)
http://www.debian.org/security/2005/dsa-939
http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2005:236
http://www.redhat.com/support/errata/RHSA-2007-0018.html
SGI Security Advisory: 20070201-01-P
ftp://patches.sgi.com/support/free/security/advisories/20070201-01-P.asc
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.443499
SuSE Security Announcement: SUSE-SR:2007:004 (Google Search)
http://www.novell.com/linux/security/advisories/2007_4_sr.html
http://www.ubuntulinux.org/support/documentation/usn/usn-233-1
BugTraq ID: 15987
http://www.securityfocus.com/bid/15987
BugTraq ID: 19289
http://www.securityfocus.com/bid/19289
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9659
http://www.vupen.com/english/advisories/2005/2996
http://www.vupen.com/english/advisories/2006/3101
http://www.osvdb.org/21906
http://securitytracker.com/id?1015383
http://secunia.com/advisories/17891
http://secunia.com/advisories/18172
http://secunia.com/advisories/18231
http://secunia.com/advisories/18266
http://secunia.com/advisories/18433
http://secunia.com/advisories/18895
http://secunia.com/advisories/21253
http://secunia.com/advisories/24007
http://secunia.com/advisories/24284
XForce ISS Database: fetchmail-null-pointer-dos(23713)
http://xforce.iss.net/xforce/xfdb/23713
Common Vulnerability Exposure (CVE) ID: CVE-2005-3656
http://www.idefense.com/intelligence/vulnerabilities/display.php?id=367
Debian Security Information: DSA-935 (Google Search)
http://www.debian.de/security/2006/dsa-935
http://www.gentoo.org/security/en/glsa/glsa-200601-05.xml
http://www.redhat.com/support/errata/RHSA-2006-0164.html
http://www.mandriva.com/security/advisories?name=MDKSA-2006:009
http://www.ubuntulinux.org/support/documentation/usn/usn-239-1
BugTraq ID: 16153
http://www.securityfocus.com/bid/16153
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10600
http://www.vupen.com/english/advisories/2006/0070
http://securitytracker.com/id?1015446
http://secunia.com/advisories/18304
http://secunia.com/advisories/18321
http://secunia.com/advisories/18348
http://secunia.com/advisories/18347
http://secunia.com/advisories/18350
http://secunia.com/advisories/18397
http://secunia.com/advisories/18403
Common Vulnerability Exposure (CVE) ID: CVE-2005-4158
Debian Security Information: DSA-946 (Google Search)
http://www.debian.org/security/2006/dsa-946
http://www.mandriva.com/security/advisories?name=MDKSA-2005:234
http://www.mandriva.com/security/advisories?name=MDKSA-2006:159
SuSE Security Announcement: SUSE-SR:2006:002 (Google Search)
http://www.novell.com/linux/security/advisories/2006_02_sr.html
http://lists.ubuntu.com/archives/ubuntu-security-announce/2006-January/000266.html
BugTraq ID: 15394
http://www.securityfocus.com/bid/15394
http://www.vupen.com/english/advisories/2005/2386
http://securitytracker.com/alerts/2005/Nov/1015192.html
http://secunia.com/advisories/17534/
http://secunia.com/advisories/18156
http://secunia.com/advisories/18308
http://secunia.com/advisories/18549
http://secunia.com/advisories/18102
http://secunia.com/advisories/18558
http://secunia.com/advisories/21692
XForce ISS Database: sudo-perl-execute-code(23102)
http://xforce.iss.net/xforce/xfdb/23102
CopyrightCopyright (c) 2006 E-Soft Inc. http://www.securityspace.com

Dies ist nur einer von 40037 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.

Registrierung eines neuen Benutzers
Email:
Benutzerkennung:
Passwort:
Bitte schicken Sie mir den monatlichen Newsletter, der mich über die neuesten Services, Verbesserungen und Umfragen informiert.
Bitte schicken Sie mir eine Anfälligkeitstest Benachrichtigung, wenn ein neuer Test hinzugefügt wird.
   Datenschutz
Anmeldung für registrierte Benutzer
 
Benutzerkennung:   
Passwort:  

 Benutzerkennung oder Passwort vergessen?
Email/Benutzerkennung:




Startseite | Über uns | Kontakt | Partnerprogramme | Developer APIs | Datenschutz | Mailinglisten | Missbrauch
Sicherheits Überprüfungen | Verwaltete DNS | Netzwerk Überwachung | Webseiten Analysator | Internet Recherche Berichte
Web Sonde | Whois

© 1998-2014 E-Soft Inc. Alle Rechte vorbehalten.