Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.63370
Kategorie:Red Hat Local Security Checks
Titel:RedHat Security Advisory RHSA-2009:0261
Zusammenfassung:The remote host is missing updates announced in;advisory RHSA-2009:0261.;;Virtual Network Computing (VNC) is a remote display system which allows you;to view a computer's desktop environment not only on the machine where it;is running, but from anywhere on the Internet and from a wide variety of;machine architectures.;;An insufficient input validation flaw was discovered in the VNC client;application, vncviewer. If an attacker could convince a victim to connect;to a malicious VNC server, or when an attacker was able to connect to;vncviewer running in the listen mode, the attacker could cause the;victim's vncviewer to crash or, possibly, execute arbitrary code.;(CVE-2008-4770);;Users of vncviewer should upgrade to these updated packages, which contain;a backported patch to resolve this issue. For the update to take effect,;all running instances of vncviewer must be restarted after the update is;installed.
Beschreibung:Summary:
The remote host is missing updates announced in
advisory RHSA-2009:0261.

Virtual Network Computing (VNC) is a remote display system which allows you
to view a computer's desktop environment not only on the machine where it
is running, but from anywhere on the Internet and from a wide variety of
machine architectures.

An insufficient input validation flaw was discovered in the VNC client
application, vncviewer. If an attacker could convince a victim to connect
to a malicious VNC server, or when an attacker was able to connect to
vncviewer running in the listen mode, the attacker could cause the
victim's vncviewer to crash or, possibly, execute arbitrary code.
(CVE-2008-4770)

Users of vncviewer should upgrade to these updated packages, which contain
a backported patch to resolve this issue. For the update to take effect,
all running instances of vncviewer must be restarted after the update is
installed.

Solution:
Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date

CVSS Score:
10.0

CVSS Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2008-4770
BugTraq ID: 31832
http://www.securityfocus.com/bid/31832
BugTraq ID: 33263
http://www.securityfocus.com/bid/33263
https://www.redhat.com/archives/fedora-package-announce/2009-January/msg01025.html
http://www.gentoo.org/security/en/glsa/glsa-200903-17.xml
http://www.realvnc.com/pipermail/vnc-list/2008-November/059432.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9367
http://www.redhat.com/support/errata/RHSA-2009-0261.html
http://secunia.com/advisories/32317
http://secunia.com/advisories/33689
http://secunia.com/advisories/34184
http://sunsolve.sun.com/search/document.do?assetkey=1-26-248526-1
http://www.vupen.com/english/advisories/2008/2868
XForce ISS Database: realvnc-cmsgreader-code-execution(45969)
https://exchange.xforce.ibmcloud.com/vulnerabilities/45969
XForce ISS Database: realvnc-rfb-protocol-code-execution(47937)
https://exchange.xforce.ibmcloud.com/vulnerabilities/47937
CopyrightCopyright (C) 2009 E-Soft Inc.

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.