Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.60668
Kategorie:Slackware Local Security Checks
Titel:Slackware: Security Advisory (SSA:2008-094-01)
Zusammenfassung:The remote host is missing an update for the 'cups' package(s) announced via the SSA:2008-094-01 advisory.
Beschreibung:Summary:
The remote host is missing an update for the 'cups' package(s) announced via the SSA:2008-094-01 advisory.

Vulnerability Insight:
New cups packages are available for Slackware 12.0, and -current to fix
security issues. The change from CUPS 1.2.x to CUPS 1.3.x was tested here,
but if you're on a completely secured internal network these issues may be
less of a risk than upgrading. If your IPP port is open to the internet,
you'd be advised to upgrade as soon as possible (or firewall the port at
the gateway if you're not in need of printer jobs coming in from the
internet).


More details about the issues may be found in the Common
Vulnerabilities and Exposures (CVE) database:

[links moved to references]


Here are the details from the Slackware 12.0 ChangeLog:
+--------------------------+
a/cups-1.3.7-i486-1_slack12.0.tgz: Upgraded to cups-1.3.7.
This version of CUPS fixes some buffer overflows in the GIF image filter
and in cgiCompileSearch. Those running CUPS servers should upgrade.
For more information on these security issues, please see:
[links moved to references]
(* Security fix *)
+--------------------------+

Affected Software/OS:
'cups' package(s) on Slackware 12.0, Slackware current.

Solution:
Please install the updated package(s).

CVSS Score:
9.3

CVSS Vector:
AV:N/AC:M/Au:N/C:C/I:C/A:C

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2008-0047
http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html
BugTraq ID: 28307
http://www.securityfocus.com/bid/28307
Cert/CC Advisory: TA08-079A
http://www.us-cert.gov/cas/techalerts/TA08-079A.html
Debian Security Information: DSA-1530 (Google Search)
http://www.debian.org/security/2008/dsa-1530
https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00091.html
https://www.redhat.com/archives/fedora-package-announce/2008-April/msg00105.html
http://security.gentoo.org/glsa/glsa-200804-01.xml
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=674
http://www.mandriva.com/security/advisories?name=MDVSA-2008:081
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10085
http://www.redhat.com/support/errata/RHSA-2008-0192.html
http://www.securitytracker.com/id?1019646
http://secunia.com/advisories/29420
http://secunia.com/advisories/29431
http://secunia.com/advisories/29448
http://secunia.com/advisories/29485
http://secunia.com/advisories/29573
http://secunia.com/advisories/29603
http://secunia.com/advisories/29634
http://secunia.com/advisories/29655
http://secunia.com/advisories/29750
SuSE Security Announcement: SUSE-SA:2008:015 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00005.html
http://www.ubuntu.com/usn/usn-598-1
http://www.vupen.com/english/advisories/2008/0921/references
http://www.vupen.com/english/advisories/2008/0924/references
Common Vulnerability Exposure (CVE) ID: CVE-2008-1373
BugTraq ID: 28544
http://www.securityfocus.com/bid/28544
Bugtraq: 20080404 rPSA-2008-0136-1 cups (Google Search)
http://www.securityfocus.com/archive/1/490486/100/0/threaded
Debian Security Information: DSA-1625 (Google Search)
http://www.debian.org/security/2008/dsa-1625
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11479
http://www.redhat.com/support/errata/RHSA-2008-0206.html
http://www.securitytracker.com/id?1019739
http://secunia.com/advisories/29630
http://secunia.com/advisories/29659
http://secunia.com/advisories/29661
http://secunia.com/advisories/31324
SuSE Security Announcement: SUSE-SA:2008:020 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00003.html
http://www.vupen.com/english/advisories/2008/1059/references
XForce ISS Database: cups-gifreadlzw-bo(41587)
https://exchange.xforce.ibmcloud.com/vulnerabilities/41587
CopyrightCopyright (C) 2012 Greenbone AG

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.