Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.56634
Kategorie:Mandrake Local Security Checks
Titel:Mandrake Security Advisory MDKSA-2006:073 (cyrus-sasl)
Zusammenfassung:NOSUMMARY
Beschreibung:Description:

The remote host is missing an update to cyrus-sasl
announced via advisory MDKSA-2006:073.

A vulnerability in the CMU Cyrus Simple Authentication and Security
Layer (SASL) library < 2.1.21, has an unknown impact and remote
unauthenticated attack vectors, related to DIGEST-MD5 negotiation. In
practice, Marcus Meissner found it is possible to crash the cyrus-imapd
daemon with a carefully crafted communication that leaves out
realm=... in the reply or the initial server response.

Updated packages have been patched to address this issue.

Affected: 10.2, Corporate 3.0, Multi Network Firewall 2.0

Solution:
To upgrade automatically use MandrakeUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

http://www.securityspace.com/smysecure/catid.html?in=MDKSA-2006:073

Risk factor : Medium

CVSS Score:
2.6

Querverweis: BugTraq ID: 17446
Common Vulnerability Exposure (CVE) ID: CVE-2006-1721
http://lists.apple.com/archives/security-announce/2006/Sep/msg00002.html
http://www.securityfocus.com/bid/17446
Bugtraq: 20080604 VMSA-2008-0009 Updates to VMware Workstation, VMware Player, VMware ACE, VMware Fusion, VMware Server, VMware VIX API, VMware ESX, VMware ESXi resolve critical security issues (Google Search)
http://www.securityfocus.com/archive/1/493080/100/0/threaded
Debian Security Information: DSA-1042 (Google Search)
http://www.debian.org/security/2006/dsa-1042
http://lists.grok.org.uk/pipermail/full-disclosure/2006-April/044992.html
http://www.gentoo.org/security/en/glsa/glsa-200604-09.xml
http://www.mandriva.com/security/advisories?name=MDKSA-2006:073
http://labs.musecurity.com/advisories/MU-200604-01.txt
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9861
http://www.redhat.com/support/errata/RHSA-2007-0795.html
http://www.redhat.com/support/errata/RHSA-2007-0878.html
http://securitytracker.com/id?1016960
http://secunia.com/advisories/19618
http://secunia.com/advisories/19753
http://secunia.com/advisories/19809
http://secunia.com/advisories/19825
http://secunia.com/advisories/19964
http://secunia.com/advisories/20014
http://secunia.com/advisories/22187
http://secunia.com/advisories/26708
http://secunia.com/advisories/26857
http://secunia.com/advisories/27237
http://secunia.com/advisories/30535
SGI Security Advisory: 20070901-01-P
ftp://patches.sgi.com/support/free/security/advisories/20070901-01-P.asc
SuSE Security Announcement: SUSE-SA:2006:025 (Google Search)
http://www.novell.com/linux/security/advisories/2006_05_05.html
http://www.trustix.org/errata/2006/0024
https://usn.ubuntu.com/272-1/
http://www.vupen.com/english/advisories/2006/1306
http://www.vupen.com/english/advisories/2006/3852
http://www.vupen.com/english/advisories/2008/1744
XForce ISS Database: cyrus-sasl-digest-dos(25738)
https://exchange.xforce.ibmcloud.com/vulnerabilities/25738
CopyrightCopyright (c) 2006 E-Soft Inc. http://www.securityspace.com

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.