Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.66411
Kategorie:Mandrake Local Security Checks
Titel:Mandriva Security Advisory MDVSA-2009:317 (netpbm)
Zusammenfassung:The remote host is missing an update to netpbm;announced via advisory MDVSA-2009:317.
Beschreibung:Summary:
The remote host is missing an update to netpbm
announced via advisory MDVSA-2009:317.

Vulnerability Insight:
Multiple security vulnerabilities has been identified and fixed
in netpbm:

Multiple integer overflows in JasPer 1.900.1 might allow
context-dependent attackers to have an unknown impact via a crafted
image file, related to integer multiplication for memory allocation
(CVE-2008-3520).

Buffer overflow in the jas_stream_printf function in
libjasper/base/jas_stream.c in JasPer 1.900.1 might allow
context-dependent attackers to have an unknown impact via
vectors related to the mif_hdr_put function and use of vsprintf
(CVE-2008-3522).

pamperspective in Netpbm before 10.35.48 does not properly calculate
a window height, which allows context-dependent attackers to cause a
denial of service (crash) via a crafted image file that triggers an
out-of-bounds read (CVE-2008-4799).

Packages for 2008.0 are being provided due to extended support for
Corporate products.

This update fixes this vulnerability.

Affected: 2008.0

Solution:
To upgrade automatically use MandrakeUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

CVSS Score:
10.0

CVSS Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2008-3520
BugTraq ID: 31470
http://www.securityfocus.com/bid/31470
http://security.gentoo.org/glsa/glsa-200812-18.xml
http://www.mandriva.com/security/advisories?name=MDVSA-2009:142
http://www.mandriva.com/security/advisories?name=MDVSA-2009:144
http://www.mandriva.com/security/advisories?name=MDVSA-2009:164
http://bugs.gentoo.org/show_bug.cgi?id=222819
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10141
http://www.redhat.com/support/errata/RHSA-2009-0012.html
RedHat Security Advisories: RHSA-2015:0698
http://rhn.redhat.com/errata/RHSA-2015-0698.html
http://secunia.com/advisories/33173
http://secunia.com/advisories/34391
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.538606
http://www.ubuntu.com/usn/USN-742-1
XForce ISS Database: jasper-image-file-bo(45621)
https://exchange.xforce.ibmcloud.com/vulnerabilities/45621
Common Vulnerability Exposure (CVE) ID: CVE-2008-3522
http://bugs.gentoo.org/attachment.cgi?id=163282&action=view
XForce ISS Database: jasper-jasstreamprintf-bo(45623)
https://exchange.xforce.ibmcloud.com/vulnerabilities/45623
Common Vulnerability Exposure (CVE) ID: CVE-2008-4799
BugTraq ID: 31871
http://www.securityfocus.com/bid/31871
https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00058.html
https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00069.html
http://www.openwall.com/lists/oss-security/2008/10/22/7
http://www.openwall.com/lists/oss-security/2008/10/23/2
XForce ISS Database: netpbm-pamperspective-pngtopnm-bo(46054)
https://exchange.xforce.ibmcloud.com/vulnerabilities/46054
CopyrightCopyright (C) 2009 E-Soft Inc.

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.