Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.58651
Kategorie:Gentoo Local Security Checks
Titel:Gentoo Security Advisory GLSA 200710-03 (libvorbis)
Zusammenfassung:The remote host is missing updates announced in;advisory GLSA 200710-03.
Beschreibung:Summary:
The remote host is missing updates announced in
advisory GLSA 200710-03.

Vulnerability Insight:
A buffer overflow vulnerability and several memory corruptions have been
discovered in libvorbis.

Solution:
All libvorbis users should upgrade to the latest version:

# emerge --sync
# emerge --ask --oneshot --verbose '>=media-libs/libvorbis-1.2.0'

CVSS Score:
6.8

CVSS Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2007-3106
20070726 libvorbis 1.1.2 - Multiple memory corruption flaws
http://www.securityfocus.com/archive/1/474729/100/0/threaded
24923
http://secunia.com/advisories/24923
25082
http://www.securityfocus.com/bid/25082
26087
http://secunia.com/advisories/26087
26232
http://secunia.com/advisories/26232
26299
http://secunia.com/advisories/26299
26429
http://secunia.com/advisories/26429
26535
http://secunia.com/advisories/26535
26865
http://secunia.com/advisories/26865
27099
http://secunia.com/advisories/27099
28614
http://secunia.com/advisories/28614
ADV-2007-2698
http://www.vupen.com/english/advisories/2007/2698
ADV-2007-2760
http://www.vupen.com/english/advisories/2007/2760
DSA-1471
http://www.debian.org/security/2008/dsa-1471
GLSA-200710-03
http://security.gentoo.org/glsa/glsa-200710-03.xml
MDKSA-2007:167-1
http://www.mandriva.com/security/advisories?name=MDKSA-2007:167-1
RHSA-2007:0845
http://www.redhat.com/support/errata/RHSA-2007-0845.html
RHSA-2007:0912
http://www.redhat.com/support/errata/RHSA-2007-0912.html
USN-498-1
http://www.ubuntu.com/usn/usn-498-1
http://www.isecpartners.com/advisories/2007-003-libvorbis.txt
http://www.tellini.org/blog/archives/32-Music-Box-1.6.html
https://bugzilla.redhat.com/show_bug.cgi?id=245991
https://bugzilla.redhat.com/show_bug.cgi?id=249780
https://issues.rpath.com/browse/RPL-1590
https://trac.xiph.org/changeset/13160
libvorbis-inverse-code-execution(35622)
https://exchange.xforce.ibmcloud.com/vulnerabilities/35622
oval:org.mitre.oval:def:11449
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11449
Common Vulnerability Exposure (CVE) ID: CVE-2007-4029
1018712
http://securitytracker.com/id?1018712
27439
http://secunia.com/advisories/27439
SUSE-SR:2007:023
http://www.novell.com/linux/security/advisories/2007_23_sr.html
libvorbis-blocksize-code-execution(35624)
https://exchange.xforce.ibmcloud.com/vulnerabilities/35624
libvorbis-infoclear-code-execution(35623)
https://exchange.xforce.ibmcloud.com/vulnerabilities/35623
oval:org.mitre.oval:def:10570
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10570
Common Vulnerability Exposure (CVE) ID: CVE-2007-4065
27170
http://secunia.com/advisories/27170
MDKSA-2007:194
http://www.mandriva.com/security/advisories?name=MDKSA-2007:194
http://svn.xiph.org/trunk/vorbis/CHANGES
https://trac.xiph.org/changeset/13217
oval:org.mitre.oval:def:9173
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9173
Common Vulnerability Exposure (CVE) ID: CVE-2007-4066
https://trac.xiph.org/changeset/13162
https://trac.xiph.org/changeset/13168
https://trac.xiph.org/changeset/13169
https://trac.xiph.org/changeset/13170
https://trac.xiph.org/changeset/13172
https://trac.xiph.org/changeset/13211
https://trac.xiph.org/changeset/13215
https://trac.xiph.org/ticket/300
https://trac.xiph.org/ticket/853
oval:org.mitre.oval:def:11453
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11453
CopyrightCopyright (C) 2008 E-Soft Inc.

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.