Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.57173
Kategorie:Slackware Local Security Checks
Titel:Slackware: Security Advisory (SSA:2006-207-04)
Zusammenfassung:The remote host is missing an update for the 'xine-lib' package(s) announced via the SSA:2006-207-04 advisory.
Beschreibung:Summary:
The remote host is missing an update for the 'xine-lib' package(s) announced via the SSA:2006-207-04 advisory.

Vulnerability Insight:
New xine-lib packages are available for Slackware 10.2 and -current to
fix security issues.

More details about these issues may be found in the Common
Vulnerabilities and Exposures (CVE) database:

[links moved to references]

Evidently there is also an issue involving AVI files which has not
been issued a CVE entry.


Here are the details from the Slackware 10.2 ChangeLog:
+--------------------------+
patches/packages/xine-lib-1.1.2-i686-1.tgz:
Upgraded to xine-lib-1.1.2.
According to xinehq.de's announcement:
There are three security fixes:
- CVE-2005-4048: possible buffer overflow in libavcodec (crafted PNGs),
- CVE-2006-2802: possible buffer overflow in the HTTP plugin,
- possible buffer overflow via bad indexes in specially-crafted AVI files.
(* Security fix *)
+--------------------------+

Affected Software/OS:
'xine-lib' package(s) on Slackware 10.2, Slackware current.

Solution:
Please install the updated package(s).

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2005-4048
BugTraq ID: 15743
http://www.securityfocus.com/bid/15743
Debian Security Information: DSA-1004 (Google Search)
http://www.debian.org/security/2006/dsa-1004
Debian Security Information: DSA-1005 (Google Search)
http://www.debian.org/security/2006/dsa-1005
Debian Security Information: DSA-992 (Google Search)
http://www.us.debian.org/security/2006/dsa-992
http://www.gentoo.org/security/en/glsa/glsa-200601-06.xml
http://www.gentoo.org/security/en/glsa/glsa-200602-01.xml
http://www.gentoo.org/security/en/glsa/glsa-200603-03.xml
http://www.mandriva.com/security/advisories?name=MDKSA-2005:228
http://www.mandriva.com/security/advisories?name=MDKSA-2005:229
http://www.mandriva.com/security/advisories?name=MDKSA-2005:230
http://www.mandriva.com/security/advisories?name=MDKSA-2005:231
http://www.mandriva.com/security/advisories?name=MDKSA-2005:232
http://article.gmane.org/gmane.comp.video.ffmpeg.devel/26558
http://secunia.com/advisories/17892
http://secunia.com/advisories/18066
http://secunia.com/advisories/18087
http://secunia.com/advisories/18107
http://secunia.com/advisories/18400
http://secunia.com/advisories/18739
http://secunia.com/advisories/18746
http://secunia.com/advisories/19114
http://secunia.com/advisories/19192
http://secunia.com/advisories/19272
http://secunia.com/advisories/19279
https://usn.ubuntu.com/230-1/
https://usn.ubuntu.com/230-2/
http://www.vupen.com/english/advisories/2005/2770
Common Vulnerability Exposure (CVE) ID: CVE-2006-2802
BugTraq ID: 18187
http://www.securityfocus.com/bid/18187
Debian Security Information: DSA-1105 (Google Search)
http://www.debian.org/security/2006/dsa-1105
https://www.exploit-db.com/exploits/1852
http://security.gentoo.org/glsa/glsa-200609-08.xml
http://www.mandriva.com/security/advisories?name=MDKSA-2006:108
http://www.osvdb.org/25936
http://secunia.com/advisories/20369
http://secunia.com/advisories/20549
http://secunia.com/advisories/20766
http://secunia.com/advisories/20828
http://secunia.com/advisories/20942
http://secunia.com/advisories/21919
SuSE Security Announcement: SUSE-SR:2006:014 (Google Search)
http://lists.suse.com/archive/suse-security-announce/2006-Jun/0008.html
https://usn.ubuntu.com/295-1/
XForce ISS Database: xinelib-xinepluginphttp-bo(26972)
https://exchange.xforce.ibmcloud.com/vulnerabilities/26972
CopyrightCopyright (C) 2012 Greenbone AG

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.