Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.64430
Kategorie:Gentoo Local Security Checks
Titel:Gentoo Security Advisory GLSA 200907-08 (rt2400 rt2500 rt2570 rt61 ralink-rt61)
Zusammenfassung:The remote host is missing updates announced in;advisory GLSA 200907-08.
Beschreibung:Summary:
The remote host is missing updates announced in
advisory GLSA 200907-08.

Vulnerability Insight:
An integer overflow in multiple Ralink wireless drivers might lead to the
execution of arbitrary code with elevated privileges.

Solution:
All external kernel modules have been masked and we recommend that
users unmerge those drivers. The Linux mainline kernel has equivalent
support for these devices and the vulnerability has been resolved in
stable versions of sys-kernel/gentoo-sources.

# emerge --unmerge 'net-wireless/rt2400'
# emerge --unmerge 'net-wireless/rt2500'
# emerge --unmerge 'net-wireless/rt2570'
# emerge --unmerge 'net-wireless/rt61'
# emerge --unmerge 'net-wireless/ralink-rt61'

CVSS Score:
9.3

CVSS Vector:
AV:N/AC:M/Au:N/C:C/I:C/A:C

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2009-0282
BugTraq ID: 33340
http://www.securityfocus.com/bid/33340
Bugtraq: 20090118 Ralinktech wireless cards drivers vulnerability (Google Search)
http://www.securityfocus.com/archive/1/500168/100/0/threaded
Debian Security Information: DSA-1712 (Google Search)
http://www.debian.org/security/2009/dsa-1712
Debian Security Information: DSA-1713 (Google Search)
http://www.debian.org/security/2009/dsa-1713
Debian Security Information: DSA-1714 (Google Search)
http://www.debian.org/security/2009/dsa-1714
http://security.gentoo.org/glsa/glsa-200907-08.xml
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=512995
http://secunia.com/advisories/33592
http://secunia.com/advisories/33699
http://secunia.com/advisories/35743
CopyrightCopyright (C) 2009 E-Soft Inc.

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.