Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.59248
Kategorie:Gentoo Local Security Checks
Titel:Gentoo Security Advisory GLSA 200711-28 (perl)
Zusammenfassung:The remote host is missing updates announced in;advisory GLSA 200711-28.
Beschreibung:Summary:
The remote host is missing updates announced in
advisory GLSA 200711-28.

Vulnerability Insight:
A buffer overflow in the Regular Expression engine in Perl possibly allows
for the execution of arbitrary code.

Solution:
All Perl users should upgrade to the latest version:

# emerge --sync
# emerge --ask --oneshot --verbose '>=dev-lang/perl-5.8.8-r4'

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2007-5116
AIX APAR: IZ10220
http://www-1.ibm.com/support/docview.wss?uid=isg1IZ10220
AIX APAR: IZ10244
http://www-1.ibm.com/support/docview.wss?uid=isg1IZ10244
http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html
BugTraq ID: 26350
http://www.securityfocus.com/bid/26350
Bugtraq: 20071110 FLEA-2007-0063-1 perl (Google Search)
http://www.securityfocus.com/archive/1/483563/100/0/threaded
Bugtraq: 20071112 FLEA-2007-0069-1 perl (Google Search)
http://www.securityfocus.com/archive/1/483584/100/0/threaded
Bugtraq: 20080108 VMSA-2008-0001 Moderate OpenPegasus PAM Authentication Buffer Overflow and updated service console packages (Google Search)
http://www.securityfocus.com/archive/1/485936/100/0/threaded
Bugtraq: 20080123 UPDATED VMSA-2008-0001.1 Moderate OpenPegasus PAM Authentication Buffer Overflow and updated service console packages (Google Search)
http://www.securityfocus.com/archive/1/486859/100/0/threaded
Cert/CC Advisory: TA07-352A
http://www.us-cert.gov/cas/techalerts/TA07-352A.html
Debian Security Information: DSA-1400 (Google Search)
http://www.debian.org/security/2007/dsa-1400
http://www.gentoo.org/security/en/glsa/glsa-200711-28.xml
HPdes Security Advisory: HPSBTU02311
http://marc.info/?l=bugtraq&m=120352263023774&w=2
HPdes Security Advisory: SSRT080001
http://www.mandriva.com/security/advisories?name=MDKSA-2007:207
https://bugzilla.redhat.com/show_bug.cgi?id=323571
https://bugzilla.redhat.com/show_bug.cgi?id=378131
http://lists.vmware.com/pipermail/security-announce/2008/000002.html
http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.023.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10669
http://www.redhat.com/support/errata/RHSA-2007-0966.html
http://www.redhat.com/support/errata/RHSA-2007-1011.html
http://securitytracker.com/id?1018899
http://secunia.com/advisories/27479
http://secunia.com/advisories/27515
http://secunia.com/advisories/27531
http://secunia.com/advisories/27546
http://secunia.com/advisories/27548
http://secunia.com/advisories/27570
http://secunia.com/advisories/27613
http://secunia.com/advisories/27756
http://secunia.com/advisories/27936
http://secunia.com/advisories/28167
http://secunia.com/advisories/28368
http://secunia.com/advisories/28387
http://secunia.com/advisories/28993
http://secunia.com/advisories/29074
http://secunia.com/advisories/31208
http://sunsolve.sun.com/search/document.do?assetkey=1-77-1018985.1-1
http://sunsolve.sun.com/search/document.do?assetkey=1-66-231524-1
http://sunsolve.sun.com/search/document.do?assetkey=1-26-31524-1
SuSE Security Announcement: SUSE-SR:2007:024 (Google Search)
http://www.novell.com/linux/security/advisories/2007_24_sr.html
http://www.ubuntu.com/usn/usn-552-1
http://www.vupen.com/english/advisories/2007/3724
http://www.vupen.com/english/advisories/2007/4238
http://www.vupen.com/english/advisories/2007/4255
http://www.vupen.com/english/advisories/2008/0064
http://www.vupen.com/english/advisories/2008/0641
XForce ISS Database: perl-unicode-bo(38270)
https://exchange.xforce.ibmcloud.com/vulnerabilities/38270
CopyrightCopyright (C) 2008 E-Soft Inc.

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.