Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.64674
Kategorie:Mandrake Local Security Checks
Titel:Mandrake Security Advisory MDVSA-2009:202 (memcached)
Zusammenfassung:The remote host is missing an update to memcached;announced via advisory MDVSA-2009:202.
Beschreibung:Summary:
The remote host is missing an update to memcached
announced via advisory MDVSA-2009:202.

Vulnerability Insight:
A vulnerability has been found and corrected in memcached:

Multiple integer overflows in memcached 1.1.12 and 1.2.2 allow remote
attackers to execute arbitrary code via vectors involving length
attributes that trigger heap-based buffer overflows (CVE-2009-2415).

This update provides a solution to this vulnerability. Additionally
memcached-1.2.x has been upgraded to 1.2.8 for 2009.0/2009.1 and MES
5 that contains a number of upstream fixes, the repcached patch has
been upgraded to 2.2 as well.

Affected: 2009.0, 2009.1, Corporate 4.0, Enterprise Server 5.0

Solution:
To upgrade automatically use MandrakeUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

CVSS Score:
10.0

CVSS Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2009-2415
35989
http://www.securityfocus.com/bid/35989
36133
http://secunia.com/advisories/36133
37729
http://secunia.com/advisories/37729
56906
http://osvdb.org/56906
DSA-1853
http://www.debian.org/security/2009/dsa-1853
FEDORA-2009-12552
https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00836.html
http://security.debian.org/pool/updates/main/m/memcached/memcached_1.1.12-1+etch1.diff.gz
http://security.debian.org/pool/updates/main/m/memcached/memcached_1.2.2-1+lenny1.diff.gz
CopyrightCopyright (C) 2009 E-Soft Inc.

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.