Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.64181
Kategorie:Mandrake Local Security Checks
Titel:Mandrake Security Advisory MDVSA-2009:130 (gstreamer0.10-plugins-good)
Zusammenfassung:The remote host is missing an update to gstreamer0.10-plugins-good;announced via advisory MDVSA-2009:130.
Beschreibung:Summary:
The remote host is missing an update to gstreamer0.10-plugins-good
announced via advisory MDVSA-2009:130.

Vulnerability Insight:
Multiple integer overflows in the (1) user_info_callback,
(2) user_endrow_callback, and (3) gst_pngdec_task functions
(ext/libpng/gstpngdec.c) in GStreamer Good Plug-ins (aka
gst-plugins-good or gstreamer-plugins-good) 0.10.15 allow remote
attackers to cause a denial of service and possibly execute arbitrary
code via a crafted PNG file, which triggers a buffer overflow
(CVE-2009-1932).

Affected: 2008.1, 2009.0, 2009.1

Solution:
To upgrade automatically use MandrakeUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

CVSS Score:
6.8

CVSS Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2009-1932
BugTraq ID: 35172
http://www.securityfocus.com/bid/35172
Debian Security Information: DSA-1839 (Google Search)
http://www.debian.org/security/2009/dsa-1839
http://security.gentoo.org/glsa/glsa-200907-11.xml
http://www.mandriva.com/security/advisories?name=MDVSA-2009:130
http://osvdb.org/54827
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10798
http://www.redhat.com/support/errata/RHSA-2009-1123.html
http://secunia.com/advisories/35205
http://secunia.com/advisories/35583
http://secunia.com/advisories/35777
http://secunia.com/advisories/35897
http://www.vupen.com/english/advisories/2009/1506
CopyrightCopyright (C) 2009 E-Soft Inc.

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.