Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.64676
Kategorie:Mandrake Local Security Checks
Titel:Mandrake Security Advisory MDVSA-2009:204 (wxgtk)
Zusammenfassung:The remote host is missing an update to wxgtk;announced via advisory MDVSA-2009:204.
Beschreibung:Summary:
The remote host is missing an update to wxgtk
announced via advisory MDVSA-2009:204.

Vulnerability Insight:
A vulnerability has been found and corrected in wxgtk:

Integer overflow in the wxImage::Create function in
src/common/image.cpp in wxWidgets 2.8.10 allows attackers to cause
a denial of service (crash) and possibly execute arbitrary code via
a crafted JPEG file, which triggers a heap-based buffer overflow.
NOTE: the provenance of this information is unknown. The details are
obtained solely from third party information (CVE-2009-2369).

This update provides a solution to this vulnerability.

Affected: 2008.1, 2009.0, 2009.1, Corporate 4.0, Enterprise Server 5.0

Solution:
To upgrade automatically use MandrakeUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

CVSS Score:
6.8

CVSS Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2009-2369
BugTraq ID: 35552
http://www.securityfocus.com/bid/35552
https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00693.html
https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00712.html
http://osvdb.org/55520
http://secunia.com/advisories/35351
http://secunia.com/advisories/35913
http://www.vupen.com/english/advisories/2009/1770
XForce ISS Database: wxwidgets-wximagecreate-bo(51516)
https://exchange.xforce.ibmcloud.com/vulnerabilities/51516
CopyrightCopyright (C) 2009 E-Soft Inc.

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.