Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.60239
Kategorie:Mandrake Local Security Checks
Titel:Mandrake Security Advisory MDVSA-2008:010 (libxml2)
Zusammenfassung:NOSUMMARY
Beschreibung:Description:

The remote host is missing an update to libxml2
announced via advisory MDVSA-2008:010.

A denial of service flaw was discovered by the Google Security Team
in the way libxml2 processes malformed XML content. This flaw could
cause the application to stop responding.

The updated packages have been patched to correct this issue.

Affected: 2007.0, 2007.1, 2008.0, Corporate 3.0, Corporate 4.0

Solution:
To upgrade automatically use MandrakeUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

http://www.securityspace.com/smysecure/catid.html?in=MDVSA-2008:010

Risk factor : Medium

CVSS Score:
5.0

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2007-6284
1019181
http://securitytracker.com/id?1019181
103201
http://sunsolve.sun.com/search/document.do?assetkey=1-26-103201-1
20080115 rPSA-2008-0017-1 libxml2
http://www.securityfocus.com/archive/1/486410/100/0/threaded
20080329 VMSA-2008-0006 Updated libxml2 service console package
http://www.securityfocus.com/archive/1/490306/100/0/threaded
201514
http://sunsolve.sun.com/search/document.do?assetkey=1-66-201514-1
27248
http://www.securityfocus.com/bid/27248
28439
http://secunia.com/advisories/28439
28444
http://secunia.com/advisories/28444
28450
http://secunia.com/advisories/28450
28452
http://secunia.com/advisories/28452
28458
http://secunia.com/advisories/28458
28466
http://secunia.com/advisories/28466
28470
http://secunia.com/advisories/28470
28475
http://secunia.com/advisories/28475
28636
http://secunia.com/advisories/28636
28716
http://secunia.com/advisories/28716
28740
http://secunia.com/advisories/28740
29591
http://secunia.com/advisories/29591
31074
http://secunia.com/advisories/31074
ADV-2008-0117
http://www.vupen.com/english/advisories/2008/0117
ADV-2008-0144
http://www.vupen.com/english/advisories/2008/0144
ADV-2008-1033
http://www.vupen.com/english/advisories/2008/1033/references
ADV-2008-2094
http://www.vupen.com/english/advisories/2008/2094/references
APPLE-SA-2008-07-11
http://lists.apple.com/archives/security-announce/2008//Jul/msg00001.html
DSA-1461
http://www.debian.org/security/2008/dsa-1461
FEDORA-2008-0462
https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00379.html
FEDORA-2008-0477
https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00396.html
GLSA-200801-20
http://security.gentoo.org/glsa/glsa-200801-20.xml
MDVSA-2008:010
http://www.mandriva.com/security/advisories?name=MDVSA-2008:010
RHSA-2008:0032
http://www.redhat.com/support/errata/RHSA-2008-0032.html
SUSE-SR:2008:002
http://www.novell.com/linux/security/advisories/suse_security_summary_report.html
USN-569-1
https://usn.ubuntu.com/569-1/
[Security-announce] 20080328 VMSA-2008-0006 Updated libxml2 service console package
http://lists.vmware.com/pipermail/security-announce/2008/000009.html
[xml] 20080111 Security flaw affecting all previous libxml2 releases
http://mail.gnome.org/archives/xml/2008-January/msg00036.html
http://bugs.gentoo.org/show_bug.cgi?id=202628
http://support.avaya.com/elmodocs2/security/ASA-2008-047.htm
http://support.avaya.com/elmodocs2/security/ASA-2008-050.htm
http://www.xmlsoft.org/news.html
https://bugzilla.redhat.com/show_bug.cgi?id=425927
https://issues.rpath.com/browse/RPL-2121
oval:org.mitre.oval:def:11594
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11594
oval:org.mitre.oval:def:5216
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5216
CopyrightCopyright (c) 2008 E-Soft Inc. http://www.securityspace.com

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.