English | Deutsch | Español | Português
 Benutzerkennung:
 Passwort:
Registrieren
 About:   Dediziert  | Erweitert  | Standard  | Wiederkehrend  | Risikolos  | Desktop  | Basis  | Einmalig  | Sicherheits Siegel  | FAQ
  Preis/Funktionszusammenfassung  | Bestellen  | Neue Anfälligkeiten  | Vertraulichkeit  | Anfälligkeiten Suche
 Anfälligkeitssuche        Suche in 75516 CVE Beschreibungen
und 39786 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.56768
Kategorie:Mandrake Local Security Checks
Titel:Mandrake Security Advisory MDKSA-2006:086 (kernel)
Zusammenfassung:Mandrake Security Advisory MDKSA-2006:086 (kernel)
Beschreibung:
The remote host is missing an update to kernel
announced via advisory MDKSA-2006:086. For details on the
issues addressed with the missing update, please visit the
referenced security advisories.

To update your kernel, please follow the directions located at:

http://www.mandriva.com/en/security/kernelupdate

Affected: 2006.0

Solution:
To upgrade automatically use MandrakeUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

http://www.securityspace.com/smysecure/catid.html?in=MDKSA-2006:086

Risk factor : High
Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2006-0744
Debian Security Information: DSA-1103 (Google Search)
http://www.debian.org/security/2006/dsa-1103
http://lwn.net/Alerts/180820/
http://www.mandriva.com/security/advisories?name=MDKSA-2006:086
http://www.mandriva.com/security/advisories?name=MDKSA-2006:150
http://www.redhat.com/support/errata/RHSA-2006-0493.html
http://www.redhat.com/support/errata/RHSA-2006-0437.html
SuSE Security Announcement: SUSE-SA:2006:028 (Google Search)
http://www.novell.com/linux/security/advisories/2006-05-31.html
SuSE Security Announcement: SUSE-SA:2006:042 (Google Search)
http://www.novell.com/linux/security/advisories/2006_42_kernel.html
SuSE Security Announcement: SUSE-SA:2006:047 (Google Search)
http://www.novell.com/linux/security/advisories/2006_47_kernel.html
http://www.ubuntu.com/usn/usn-302-1
BugTraq ID: 17541
http://www.securityfocus.com/bid/17541
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9732
http://www.vupen.com/english/advisories/2006/1390
http://www.vupen.com/english/advisories/2006/2554
http://www.vupen.com/english/advisories/2006/1475
http://www.osvdb.org/24639
http://secunia.com/advisories/19639
http://secunia.com/advisories/19735
http://secunia.com/advisories/20157
http://secunia.com/advisories/20237
http://secunia.com/advisories/20716
http://secunia.com/advisories/20914
http://secunia.com/advisories/21136
http://secunia.com/advisories/21179
http://secunia.com/advisories/21745
http://secunia.com/advisories/20398
http://secunia.com/advisories/21983
http://secunia.com/advisories/21498
XForce ISS Database: linux-uncanonical-addr-dos(25869)
http://xforce.iss.net/xforce/xfdb/25869
Common Vulnerability Exposure (CVE) ID: CVE-2006-1052
http://marc.theaimsgroup.com/?l=selinux&m=114226465106131&w=2
http://marc.theaimsgroup.com/?l=git-commits-head&m=114210002712363&w=2
http://selinuxnews.org/wp/index.php/2006/03/13/security-ptrace-bug-cve-2006-1052/
Debian Security Information: DSA-1184 (Google Search)
http://www.debian.org/security/2006/dsa-1184
http://www.redhat.com/support/errata/RHSA-2006-0575.html
http://www.ubuntulinux.org/support/documentation/usn/usn-281-1
BugTraq ID: 17830
http://www.securityfocus.com/bid/17830
http://www.osvdb.org/25232
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10102
http://secunia.com/advisories/19955
http://secunia.com/advisories/21465
http://secunia.com/advisories/22093
http://secunia.com/advisories/22417
Common Vulnerability Exposure (CVE) ID: CVE-2006-1242
Bugtraq: 20060314 Linux zero IP ID vulnerability? (Google Search)
http://www.securityfocus.com/archive/1/archive/1/427622/100/0/threaded
Bugtraq: 20060323 Re: Linux zero IP ID vulnerability? (Google Search)
http://www.securityfocus.com/archive/1/archive/1/427753/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/427893/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/428605/30/6210/threaded
Debian Security Information: DSA-1097 (Google Search)
http://www.debian.org/security/2006/dsa-1097
BugTraq ID: 17109
http://www.securityfocus.com/bid/17109
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10317
http://www.vupen.com/english/advisories/2006/1140
http://secunia.com/advisories/19402
http://secunia.com/advisories/20671
Common Vulnerability Exposure (CVE) ID: CVE-2006-1522
BugTraq ID: 17451
http://www.securityfocus.com/bid/17451
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9325
http://www.vupen.com/english/advisories/2006/1307
http://www.osvdb.org/24507
http://secunia.com/advisories/19573
XForce ISS Database: linux-keyringsearchone-dos(25722)
http://xforce.iss.net/xforce/xfdb/25722
Common Vulnerability Exposure (CVE) ID: CVE-2006-1525
BugTraq ID: 17593
http://www.securityfocus.com/bid/17593
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10146
http://www.vupen.com/english/advisories/2006/1399
http://www.osvdb.org/24715
http://secunia.com/advisories/19709
http://secunia.com/advisories/21476
XForce ISS Database: linux-ip-route-input-dos(25872)
http://xforce.iss.net/xforce/xfdb/25872
Common Vulnerability Exposure (CVE) ID: CVE-2006-1527
http://www.trustix.org/errata/2006/0024
BugTraq ID: 17806
http://www.securityfocus.com/bid/17806
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10373
http://www.vupen.com/english/advisories/2006/1632
http://www.osvdb.org/25229
http://secunia.com/advisories/19926
XForce ISS Database: linux-sctp-netfilter-dos(26194)
http://xforce.iss.net/xforce/xfdb/26194
Common Vulnerability Exposure (CVE) ID: CVE-2006-2071
Bugtraq: 20061113 VMSA-2006-0006 - VMware ESX Server 2.5.3 Upgrade Patch 4 (Google Search)
http://www.securityfocus.com/archive/1/archive/1/451404/100/0/threaded
Bugtraq: 20061113 VMSA-2006-0005 - VMware ESX Server 2.5.4 Upgrade Patch 1 (Google Search)
http://www.securityfocus.com/archive/1/archive/1/451419/100/200/threaded
Bugtraq: 20061113 VMSA-2006-0007 - VMware ESX Server 2.1.3 Upgrade Patch 2 (Google Search)
http://www.securityfocus.com/archive/1/archive/1/451417/100/200/threaded
Bugtraq: 20061113 VMSA-2006-0008 - VMware ESX Server 2.0.2 Upgrade Patch 2 (Google Search)
http://www.securityfocus.com/archive/1/archive/1/451426/100/200/threaded
http://www.redhat.com/support/errata/RHSA-2006-0579.html
http://www.redhat.com/support/errata/RHSA-2006-0580.html
http://www.redhat.com/support/errata/RHSA-2006-0689.html
http://www.redhat.com/support/errata/RHSA-2006-0710.html
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9978
http://www.vupen.com/english/advisories/2006/4502
http://www.vupen.com/english/advisories/2006/1391
http://www.osvdb.org/25139
http://secunia.com/advisories/21035
http://secunia.com/advisories/22292
http://secunia.com/advisories/22497
http://secunia.com/advisories/22945
http://secunia.com/advisories/22875
http://secunia.com/advisories/23064
XForce ISS Database: linux-mprotect-security-bypass(26169)
http://xforce.iss.net/xforce/xfdb/26169
Common Vulnerability Exposure (CVE) ID: CVE-2006-2271
http://archives.neohapsis.com/archives/fulldisclosure/2006-05/0227.html
http://labs.musecurity.com/advisories/MU-200605-01.txt
http://www.trustix.org/errata/2006/0026
BugTraq ID: 17910
http://www.securityfocus.com/bid/17910
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10934
http://www.vupen.com/english/advisories/2006/1734
http://www.osvdb.org/25632
http://secunia.com/advisories/19990
XForce ISS Database: linux-sctp-ecne-chunk-dos(26430)
http://xforce.iss.net/xforce/xfdb/26430
Common Vulnerability Exposure (CVE) ID: CVE-2006-2272
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11243
http://www.osvdb.org/25633
XForce ISS Database: linux-sctp-control-chunk-dos(26431)
http://xforce.iss.net/xforce/xfdb/26431
CopyrightCopyright (c) 2006 E-Soft Inc. http://www.securityspace.com

Dies ist nur einer von 39786 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.

Registrierung eines neuen Benutzers
Email:
Benutzerkennung:
Passwort:
Bitte schicken Sie mir den monatlichen Newsletter, der mich über die neuesten Services, Verbesserungen und Umfragen informiert.
Bitte schicken Sie mir eine Anfälligkeitstest Benachrichtigung, wenn ein neuer Test hinzugefügt wird.
   Datenschutz
Anmeldung für registrierte Benutzer
 
Benutzerkennung:   
Passwort:  

 Benutzerkennung oder Passwort vergessen?
Email/Benutzerkennung:




Startseite | Über uns | Kontakt | Partnerprogramme | Datenschutz | Mailinglisten | Missbrauch
Sicherheits Überprüfungen | Verwaltete DNS | Netzwerk Überwachung | Webseiten Analysator | Internet Recherche Berichte
Web Sonde | Whois

© 1998-2014 E-Soft Inc. Alle Rechte vorbehalten.