![]() |
Startseite ▼ Bookkeeping
Online ▼ Sicherheits
Überprüfungs ▼
Verwaltetes
DNS ▼
Info
Bestellen/Erneuern
FAQ
AUP
Dynamic DNS Clients
Domaine konfigurieren Dyanmic DNS Update Password Netzwerk
Überwachung ▼
Enterprise
Erweiterte
Standard
Gratis Test
FAQ
Preis/Funktionszusammenfassung
Bestellen
Beispiele
Konfigurieren/Status Alarm Profile | ||
Test Kennung: | 1.3.6.1.4.1.25623.1.0.64430 |
Kategorie: | Gentoo Local Security Checks |
Titel: | Gentoo Security Advisory GLSA 200907-08 (rt2400 rt2500 rt2570 rt61 ralink-rt61) |
Zusammenfassung: | The remote host is missing updates announced in;advisory GLSA 200907-08. |
Beschreibung: | Summary: The remote host is missing updates announced in advisory GLSA 200907-08. Vulnerability Insight: An integer overflow in multiple Ralink wireless drivers might lead to the execution of arbitrary code with elevated privileges. Solution: All external kernel modules have been masked and we recommend that users unmerge those drivers. The Linux mainline kernel has equivalent support for these devices and the vulnerability has been resolved in stable versions of sys-kernel/gentoo-sources. # emerge --unmerge 'net-wireless/rt2400' # emerge --unmerge 'net-wireless/rt2500' # emerge --unmerge 'net-wireless/rt2570' # emerge --unmerge 'net-wireless/rt61' # emerge --unmerge 'net-wireless/ralink-rt61' CVSS Score: 9.3 CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C |
Querverweis: |
Common Vulnerability Exposure (CVE) ID: CVE-2009-0282 BugTraq ID: 33340 http://www.securityfocus.com/bid/33340 Bugtraq: 20090118 Ralinktech wireless cards drivers vulnerability (Google Search) http://www.securityfocus.com/archive/1/500168/100/0/threaded Debian Security Information: DSA-1712 (Google Search) http://www.debian.org/security/2009/dsa-1712 Debian Security Information: DSA-1713 (Google Search) http://www.debian.org/security/2009/dsa-1713 Debian Security Information: DSA-1714 (Google Search) http://www.debian.org/security/2009/dsa-1714 http://security.gentoo.org/glsa/glsa-200907-08.xml http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=512995 http://secunia.com/advisories/33592 http://secunia.com/advisories/33699 http://secunia.com/advisories/35743 |
Copyright | Copyright (C) 2009 E-Soft Inc. |
Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus. Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten. |