Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 146377 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.66753
Kategorie:CentOS Local Security Checks
Titel:CentOS Security Advisory CESA-2010:0044 (pidgin)
Zusammenfassung:NOSUMMARY
Beschreibung:Description:
The remote host is missing updates to pidgin announced in
advisory CESA-2010:0044.

For details on the issues addressed in this update,
please visit the referenced security advisories.

Solution:
Update the appropriate packages on your system.

http://www.securityspace.com/smysecure/catid.html?in=CESA-2010:0044
http://www.securityspace.com/smysecure/catid.html?in=RHSA-2010:0044
https://rhn.redhat.com/errata/RHSA-2010-0044.html

Risk factor : Medium

CVSS Score:
5.0

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2010-0013
1022203
http://sunsolve.sun.com/search/document.do?assetkey=1-77-1022203.1-1
277450
http://sunsolve.sun.com/search/document.do?assetkey=1-66-277450-1
37953
http://secunia.com/advisories/37953
37954
http://secunia.com/advisories/37954
37961
http://secunia.com/advisories/37961
38915
http://secunia.com/advisories/38915
ADV-2009-3662
http://www.vupen.com/english/advisories/2009/3662
ADV-2009-3663
http://www.vupen.com/english/advisories/2009/3663
ADV-2010-1020
http://www.vupen.com/english/advisories/2010/1020
FEDORA-2010-0368
http://lists.fedoraproject.org/pipermail/package-announce/2010-January/033771.html
FEDORA-2010-0429
http://lists.fedoraproject.org/pipermail/package-announce/2010-January/033848.html
MDVSA-2010:085
http://www.mandriva.com/security/advisories?name=MDVSA-2010:085
SUSE-SR:2010:006
http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00004.html
[oss-security] 20100102 CVE request - pidgin MSN arbitrary file upload
http://www.openwall.com/lists/oss-security/2010/01/02/1
[oss-security] 20100107 Re: CVE request - pidgin MSN arbitrary file upload
http://www.openwall.com/lists/oss-security/2010/01/07/1
http://www.openwall.com/lists/oss-security/2010/01/07/2
http://d.pidgin.im/viewmtn/revision/info/3d02401cf232459fc80c0837d31e05fae7ae5467
http://d.pidgin.im/viewmtn/revision/info/4be2df4f72bd8a55cdae7f2554b73342a497c92f
http://d.pidgin.im/viewmtn/revision/info/c64a1adc8bda2b4aeaae1f273541afbc4f71b810
http://developer.pidgin.im/viewmtn/revision/diff/3d02401cf232459fc80c0837d31e05fae7ae5467/with/c64a1adc8bda2b4aeaae1f273541afbc4f71b810/libpurple/protocols/msn/slp.c
http://events.ccc.de/congress/2009/Fahrplan/events/3596.en.html
https://bugzilla.redhat.com/show_bug.cgi?id=552483
oval:org.mitre.oval:def:10333
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10333
oval:org.mitre.oval:def:17620
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17620
CopyrightCopyright (c) 2010 E-Soft Inc. http://www.securityspace.com

Dies ist nur einer von 146377 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.