Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.56446
Kategorie:FreeBSD Local Security Checks
Titel:FreeBSD Ports: linux-realplayer
Zusammenfassung:The remote host is missing an update to the system; as announced in the referenced advisory.
Beschreibung:Summary:
The remote host is missing an update to the system
as announced in the referenced advisory.

Vulnerability Insight:
The following package is affected: linux-realplayer

CVE-2006-0323
Buffer overflow in multiple RealNetworks products and versions
including RealPlayer 10.x, RealOne Player, Rhapsody 3, and Helix
Player allows remote attackers to have an unknown impact via a
malicious SWF file (Flash media).

Solution:
Update your system with the appropriate patches or
software upgrades.

CVSS Score:
9.3

CVSS Vector:
AV:N/AC:M/Au:N/C:C/I:C/A:C

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2006-0323
BugTraq ID: 17202
http://www.securityfocus.com/bid/17202
Bugtraq: 20060411 Realplayer .SWF Multiple Remote Memory Corruption Vulnerabilities (Google Search)
http://www.securityfocus.com/archive/1/430621/100/0/threaded
CERT/CC vulnerability note: VU#231028
http://www.kb.cert.org/vuls/id/231028
http://www.gentoo.org/security/en/glsa/glsa-200603-24.xml
http://www.redhat.com/support/errata/RHSA-2006-0257.html
http://securitytracker.com/id?1015806
http://secunia.com/advisories/19358
http://secunia.com/advisories/19362
http://secunia.com/advisories/19365
http://secunia.com/advisories/19390
http://securityreason.com/securityalert/690
SuSE Security Announcement: SUSE-SA:2006:018 (Google Search)
http://www.novell.com/linux/security/advisories/2006_18_realplayer.html
http://www.vupen.com/english/advisories/2006/1057
XForce ISS Database: realnetworks-swf-bo(25408)
https://exchange.xforce.ibmcloud.com/vulnerabilities/25408
CopyrightCopyright (C) 2008 E-Soft Inc.

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.