Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.57175
Kategorie:Trustix Local Security Checks
Titel:Trustix Security Advisory TSLSA-2006-0042 (Multiple packages)
Zusammenfassung:NOSUMMARY
Beschreibung:Description:

The remote host is missing updates announced in
advisory TSLSA-2006-0042.

gnupg < TSL 3.0 > < TSL 2.2 > < TSEL 2 >
- SECURITY Fix: A vulnerability has been reported in GnuPG, cause due
to an input validation error within parse-packet.c when handling
the length of a message packet. This can be exploited to cause gpg
to consume large amount of memory or crash via an overly large packet
length in a message packet. This can be further exploited to cause an
integer overflow which leads to a possible memory corruption that
crashes gpg.

The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the name CVE-2006-3082 to this issue.

kernel < TSL 3.0 >
- New upstream.
- Upgraded 3ware 9xxx RAID driver, Bug #1823.
- SECURITY FIX: A vulnerability has been reported in the Linux kernel,
which can be exploited by malicious, local users to gain escalated
privileges. The vulnerability is caused due to a race condition in
/proc when changing file status. Successful exploitation allows
execution of arbitrary code with root privileges.

The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the name CVE-2006-3626 to this issue.

samba < TSL 3.0 > < TSL 2.2 > < TSEL 2 >
- SECURITY Fix: A vulnerability has been reported in Samba, caused due
to an error when handling a lot of share connection requests. This
can be exploited to cause smbd to exhaust memory resources via a
large number of share connections.

The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the name CVE-2006-3403 to this issue.

Solution:
Update your system with the packages as indicated in
the referenced security advisory.

http://www.securityspace.com/smysecure/catid.html?in=TSLSA-2006-0042

Risk factor : High

CVSS Score:
6.2

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2006-3082
BugTraq ID: 18554
http://www.securityfocus.com/bid/18554
Bugtraq: 20060629 rPSA-2006-0120-1 gnupg (Google Search)
http://www.securityfocus.com/archive/1/438751/100/0/threaded
Debian Security Information: DSA-1107 (Google Search)
http://www.debian.org/security/2006/dsa-1107
Debian Security Information: DSA-1115 (Google Search)
http://www.debian.org/security/2006/dsa-1115
http://seclists.org/lists/fulldisclosure/2006/May/0774.html
http://seclists.org/lists/fulldisclosure/2006/May/0782.html
http://seclists.org/lists/fulldisclosure/2006/May/0789.html
http://www.mandriva.com/security/advisories?name=MDKSA-2006:110
http://www.openpkg.com/security/advisories/OpenPKG-SA-2006.010.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10089
http://www.redhat.com/support/errata/RHSA-2006-0571.html
http://securitytracker.com/id?1016519
http://secunia.com/advisories/20783
http://secunia.com/advisories/20801
http://secunia.com/advisories/20811
http://secunia.com/advisories/20829
http://secunia.com/advisories/20881
http://secunia.com/advisories/20899
http://secunia.com/advisories/20968
http://secunia.com/advisories/21063
http://secunia.com/advisories/21135
http://secunia.com/advisories/21137
http://secunia.com/advisories/21143
http://secunia.com/advisories/21585
SGI Security Advisory: 20060701-01-U
ftp://patches.sgi.com/support/free/security/advisories/20060701-01-U
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.457382
SuSE Security Announcement: SUSE-SR:2006:015 (Google Search)
http://www.novell.com/linux/security/advisories/2006_38_security.html
SuSE Security Announcement: SUSE-SR:2006:018 (Google Search)
http://www.novell.com/linux/security/advisories/2006_18_sr.html
https://usn.ubuntu.com/304-1/
http://www.vupen.com/english/advisories/2006/2450
XForce ISS Database: gnupg-parsepacket-bo(27245)
https://exchange.xforce.ibmcloud.com/vulnerabilities/27245
Common Vulnerability Exposure (CVE) ID: CVE-2006-3626
BugTraq ID: 18992
http://www.securityfocus.com/bid/18992
Bugtraq: 20060717 rPSA-2006-0130-1 kernel (Google Search)
http://www.securityfocus.com/archive/1/440300/100/0/threaded
Debian Security Information: DSA-1111 (Google Search)
http://www.debian.org/security/2006/dsa-1111
http://lists.grok.org.uk/pipermail/full-disclosure/2006-July/047907.html
http://www.mandriva.com/security/advisories?name=MDKSA-2006:124
http://www.osvdb.org/27120
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10060
http://www.redhat.com/support/errata/RHSA-2006-0617.html
http://secunia.com/advisories/21041
http://secunia.com/advisories/21057
http://secunia.com/advisories/21073
http://secunia.com/advisories/21119
http://secunia.com/advisories/21123
http://secunia.com/advisories/21179
http://secunia.com/advisories/21498
http://secunia.com/advisories/21605
http://secunia.com/advisories/22174
SuSE Security Announcement: SUSE-SA:2006:042 (Google Search)
http://www.novell.com/linux/security/advisories/2006_42_kernel.html
SuSE Security Announcement: SUSE-SA:2006:047 (Google Search)
http://www.novell.com/linux/security/advisories/2006_47_kernel.html
SuSE Security Announcement: SUSE-SA:2006:049 (Google Search)
http://www.novell.com/linux/security/advisories/2006_49_kernel.html
SuSE Security Announcement: SUSE-SR:2006:017 (Google Search)
http://www.novell.com/linux/security/advisories/2006_17_sr.html
https://usn.ubuntu.com/319-1/
http://www.ubuntu.com/usn/usn-319-2
http://www.vupen.com/english/advisories/2006/2816
XForce ISS Database: linux-proc-race-condition(27790)
https://exchange.xforce.ibmcloud.com/vulnerabilities/27790
Common Vulnerability Exposure (CVE) ID: CVE-2006-3403
http://lists.apple.com/archives/security-announce/2006/Nov/msg00001.html
BugTraq ID: 18927
http://www.securityfocus.com/bid/18927
Bugtraq: 20060710 Re: [ANNOUNCEMENT] Samba 3.0.1 - 3.0.22: memory exhaustion DoS against smbd (Google Search)
http://www.securityfocus.com/archive/1/439875/100/0/threaded
Bugtraq: 20060710 [ANNOUNCEMENT] Samba 3.0.1 - 3.0.22: memory exhaustion DoS against smbd (Google Search)
http://www.securityfocus.com/archive/1/439757/100/0/threaded
Bugtraq: 20060711 rPSA-2006-0128-1 samba samba-swat (Google Search)
http://www.securityfocus.com/archive/1/439880/100/100/threaded
Bugtraq: 20060720 Samba Internal Data Structures DOS Vulnerability Exploit (Google Search)
http://www.securityfocus.com/archive/1/440767/100/0/threaded
Bugtraq: 20060721 Re: Samba Internal Data Structures DOS Vulnerability Exploit (Google Search)
http://www.securityfocus.com/archive/1/440836/100/0/threaded
Bugtraq: 20061113 VMSA-2006-0006 - VMware ESX Server 2.5.3 Upgrade Patch 4 (Google Search)
http://www.securityfocus.com/archive/1/451404/100/0/threaded
Bugtraq: 20061113 VMSA-2006-0007 - VMware ESX Server 2.1.3 Upgrade Patch 2 (Google Search)
http://www.securityfocus.com/archive/1/451417/100/200/threaded
Bugtraq: 20061113 VMSA-2006-0008 - VMware ESX Server 2.0.2 Upgrade Patch 2 (Google Search)
http://www.securityfocus.com/archive/1/451426/100/200/threaded
Cert/CC Advisory: TA06-333A
http://www.us-cert.gov/cas/techalerts/TA06-333A.html
CERT/CC vulnerability note: VU#313836
http://www.kb.cert.org/vuls/id/313836
Debian Security Information: DSA-1110 (Google Search)
http://www.debian.org/security/2006/dsa-1110
http://security.gentoo.org/glsa/glsa-200607-10.xml
HPdes Security Advisory: HPSBUX02155
http://www.securityfocus.com/archive/1/448957/100/0/threaded
HPdes Security Advisory: SSRT061235
http://www.mandriva.com/security/advisories?name=MDKSA-2006:120
http://securitydot.net/xpl/exploits/vulnerabilities/articles/1175/exploit.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11355
http://www.redhat.com/support/errata/RHSA-2006-0591.html
http://securitytracker.com/id?1016459
http://secunia.com/advisories/20980
http://secunia.com/advisories/20983
http://secunia.com/advisories/21018
http://secunia.com/advisories/21019
http://secunia.com/advisories/21046
http://secunia.com/advisories/21086
http://secunia.com/advisories/21159
http://secunia.com/advisories/21187
http://secunia.com/advisories/21190
http://secunia.com/advisories/21262
http://secunia.com/advisories/22875
http://secunia.com/advisories/23155
SGI Security Advisory: 20060703-01-P
ftp://patches.sgi.com/support/free/security/advisories/20060703-01-U.asc
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.416876
http://www.ubuntu.com/usn/usn-314-1
http://www.vupen.com/english/advisories/2006/2745
http://www.vupen.com/english/advisories/2006/4502
http://www.vupen.com/english/advisories/2006/4750
XForce ISS Database: samba-smbd-connection-dos(27648)
https://exchange.xforce.ibmcloud.com/vulnerabilities/27648
CopyrightCopyright (c) 2006 E-Soft Inc. http://www.securityspace.com

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.