Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.56654
Kategorie:FreeBSD Local Security Checks
Titel:FreeBSD Ports: zgv
Zusammenfassung:The remote host is missing an update to the system; as announced in the referenced advisory.
Beschreibung:Summary:
The remote host is missing an update to the system
as announced in the referenced advisory.

Vulnerability Insight:
The following packages are affected:

zgv
xzgv

CVE-2006-1060
Heap-based buffer overflow in zgv before 5.8 and xzgv before 0.8 might
allow user-complicit attackers to execute arbitrary code via a JPEG
image with more than 3 output components, such as a CMYK or YCCK color
space, which causes less memory to be allocated than required.

Solution:
Update your system with the appropriate patches or
software upgrades.

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2006-1060
BugTraq ID: 17409
http://www.securityfocus.com/bid/17409
Debian Security Information: DSA-1037 (Google Search)
http://www.debian.org/security/2006/dsa-1037
Debian Security Information: DSA-1038 (Google Search)
http://www.debian.org/security/2006/dsa-1038
http://secunia.com/advisories/19571
http://secunia.com/advisories/19572
http://secunia.com/advisories/19731
http://secunia.com/advisories/19757
http://secunia.com/advisories/19779
http://secunia.com/advisories/19790
http://securityreason.com/securityalert/756
SuSE Security Announcement: SUSE-SR:2006:008 (Google Search)
http://www.novell.com/linux/security/advisories/2006_08_sr.html
http://www.vupen.com/english/advisories/2006/1288
XForce ISS Database: xzgv-jpeg-bo(25718)
https://exchange.xforce.ibmcloud.com/vulnerabilities/25718
CopyrightCopyright (C) 2008 E-Soft Inc.

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.