Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.61803
Kategorie:FreeBSD Local Security Checks
Titel:FreeBSD Ports: libxml2
Zusammenfassung:The remote host is missing an update to the system; as announced in the referenced advisory.
Beschreibung:Summary:
The remote host is missing an update to the system
as announced in the referenced advisory.

Vulnerability Insight:
The following package is affected: libxml2

CVE-2008-3281
libxml2 2.6.32 and earlier does not properly detect recursion during
entity expansion in an attribute value, which allows context-dependent
attackers to cause a denial of service (memory and CPU consumption)
via a crafted XML document.

CVE-2008-3529
Heap-based buffer overflow in the xmlParseAttValueComplex function in
parser.c in libxml2 before 2.7.0 allows context-dependent attackers to
cause a denial of service (crash) or possibly execute arbitrary code
via a long XML entity name.

Solution:
Update your system with the appropriate patches or
software upgrades.

CVSS Score:
10.0

CVSS Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2008-3281
1020728
http://www.securitytracker.com/id?1020728
20081031 VMSA-2008-0017 Updated ESX packages for libxml2, ucd-snmp, libtiff
http://www.securityfocus.com/archive/1/497962/100/0/threaded
30783
http://www.securityfocus.com/bid/30783
31558
http://secunia.com/advisories/31558
31566
http://secunia.com/advisories/31566
31590
http://secunia.com/advisories/31590
31728
http://secunia.com/advisories/31728
31748
http://secunia.com/advisories/31748
31855
http://secunia.com/advisories/31855
31982
http://secunia.com/advisories/31982
32488
http://secunia.com/advisories/32488
32807
http://secunia.com/advisories/32807
32974
http://secunia.com/advisories/32974
35379
http://secunia.com/advisories/35379
ADV-2008-2419
http://www.vupen.com/english/advisories/2008/2419
ADV-2008-2843
http://www.vupen.com/english/advisories/2008/2843
ADV-2008-2971
http://www.vupen.com/english/advisories/2008/2971
ADV-2009-1522
http://www.vupen.com/english/advisories/2009/1522
ADV-2009-1621
http://www.vupen.com/english/advisories/2009/1621
APPLE-SA-2009-06-08-1
http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html
APPLE-SA-2009-06-17-1
http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html
DSA-1631
http://www.debian.org/security/2008/dsa-1631
FEDORA-2008-7395
https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00347.html
FEDORA-2008-7594
https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00261.html
GLSA-200812-06
http://security.gentoo.org/glsa/glsa-200812-06.xml
MDVSA-2008:180
http://www.mandriva.com/security/advisories?name=MDVSA-2008:180
MDVSA-2008:192
http://www.mandriva.com/security/advisories?name=MDVSA-2008:192
RHSA-2008:0836
https://rhn.redhat.com/errata/RHSA-2008-0836.html
SUSE-SR:2008:018
http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00004.html
USN-640-1
http://www.ubuntu.com/usn/usn-640-1
USN-644-1
https://usn.ubuntu.com/644-1/
[Security-announce] 20081030 VMSA-2008-0017 Updated ESX packages for libxml2, ucd-snmp, libtiff
http://lists.vmware.com/pipermail/security-announce/2008/000039.html
[xml] 20080820 Security fix for libxml2
http://mail.gnome.org/archives/xml/2008-August/msg00034.html
http://support.apple.com/kb/HT3613
http://support.apple.com/kb/HT3639
http://svn.gnome.org/viewvc/libxml2?view=revision&revision=3772
http://wiki.rpath.com/Advisories:rPSA-2008-0325
http://www.vmware.com/security/advisories/VMSA-2008-0017.html
http://xmlsoft.org/news.html
https://bugzilla.redhat.com/show_bug.cgi?id=458086
oval:org.mitre.oval:def:6496
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6496
oval:org.mitre.oval:def:9812
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9812
Common Vulnerability Exposure (CVE) ID: CVE-2008-3529
1020855
http://securitytracker.com/id?1020855
247346
http://sunsolve.sun.com/search/document.do?assetkey=1-26-247346-1
261688
http://sunsolve.sun.com/search/document.do?assetkey=1-66-261688-1
265329
http://sunsolve.sun.com/search/document.do?assetkey=1-66-265329-1
31126
http://www.securityfocus.com/bid/31126
31860
http://secunia.com/advisories/31860
31868
http://secunia.com/advisories/31868
32265
http://secunia.com/advisories/32265
32280
http://secunia.com/advisories/32280
33715
http://secunia.com/advisories/33715
33722
http://secunia.com/advisories/33722
35056
http://secunia.com/advisories/35056
35074
http://secunia.com/advisories/35074
36173
http://secunia.com/advisories/36173
36235
http://secunia.com/advisories/36235
8798
https://www.exploit-db.com/exploits/8798
ADV-2008-2822
http://www.vupen.com/english/advisories/2008/2822
ADV-2009-1297
http://www.vupen.com/english/advisories/2009/1297
ADV-2009-1298
http://www.vupen.com/english/advisories/2009/1298
APPLE-SA-2009-05-12
http://lists.apple.com/archives/security-announce/2009/May/msg00000.html
DSA-1654
http://www.debian.org/security/2008/dsa-1654
RHSA-2008:0884
http://www.redhat.com/support/errata/RHSA-2008-0884.html
RHSA-2008:0886
http://www.redhat.com/support/errata/RHSA-2008-0886.html
TA09-133A
http://www.us-cert.gov/cas/techalerts/TA09-133A.html
USN-815-1
http://www.ubuntu.com/usn/USN-815-1
http://sunsolve.sun.com/search/document.do?assetkey=1-21-126356-03-1
http://sunsolve.sun.com/search/document.do?assetkey=1-21-141243-01-1
http://support.apple.com/kb/HT3549
http://support.apple.com/kb/HT3550
http://support.avaya.com/elmodocs2/security/ASA-2008-400.htm
http://support.avaya.com/elmodocs2/security/ASA-2009-025.htm
https://bugzilla.redhat.com/show_bug.cgi?id=461015
libxml2-entitynames-bo(45085)
https://exchange.xforce.ibmcloud.com/vulnerabilities/45085
oval:org.mitre.oval:def:11760
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11760
oval:org.mitre.oval:def:6103
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6103
CopyrightCopyright (C) 2008 E-Soft Inc.

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.