Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.69344
Kategorie:Slackware Local Security Checks
Titel:Slackware: Security Advisory (SSA:2011-070-02)
Zusammenfassung:The remote host is missing an update for the 'pidgin' package(s) announced via the SSA:2011-070-02 advisory.
Beschreibung:Summary:
The remote host is missing an update for the 'pidgin' package(s) announced via the SSA:2011-070-02 advisory.

Vulnerability Insight:
New pidgin packages are available for Slackware 12.0, 12.1, 12.2, 13.0, 13.1,
and -current to fix security issues.


Here are the details from the Slackware 13.1 ChangeLog:
+--------------------------+
patches/packages/pidgin-2.7.11-i486-1_slack13.1.txz: Upgraded.
Fixed denials of service caused by NULL pointer dereferences due to
improper handling of malformed YMSG packets.
For more information, see:
[link moved to references]
(* Security fix *)
+--------------------------+

Affected Software/OS:
'pidgin' package(s) on Slackware 12.0, Slackware 12.1, Slackware 12.2, Slackware 13.0, Slackware 13.1, Slackware current.

Solution:
Please install the updated package(s).

CVSS Score:
4.0

CVSS Vector:
AV:N/AC:L/Au:S/C:N/I:N/A:P

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2011-1091
43695
http://secunia.com/advisories/43695
43721
http://secunia.com/advisories/43721
46376
http://secunia.com/advisories/46376
46837
http://www.securityfocus.com/bid/46837
ADV-2011-0643
http://www.vupen.com/english/advisories/2011/0643
ADV-2011-0661
http://www.vupen.com/english/advisories/2011/0661
ADV-2011-0669
http://www.vupen.com/english/advisories/2011/0669
ADV-2011-0703
http://www.vupen.com/english/advisories/2011/0703
FEDORA-2011-3113
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055874.html
FEDORA-2011-3150
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056309.html
RHSA-2011:0616
http://www.redhat.com/support/errata/RHSA-2011-0616.html
RHSA-2011:1371
http://www.redhat.com/support/errata/RHSA-2011-1371.html
SSA:2011-070-02
http://slackware.com/security/viewer.php?l=slackware-security&y=2011&m=slackware-security.466884
http://developer.pidgin.im/viewmtn/revision/diff/5cbe18129b6e7c660bc093f7e5e1414ceca17d04/with/a7c415abba1f5f01f79295337518837f73d99bb7/libpurple/protocols/yahoo/libymsg.c
http://developer.pidgin.im/viewmtn/revision/info/a7c415abba1f5f01f79295337518837f73d99bb7
http://www.pidgin.im/news/security/?id=51
https://bugzilla.redhat.com/show_bug.cgi?id=683031
openSUSE-SU-2012:0066
https://hermes.opensuse.org/messages/13195955
oval:org.mitre.oval:def:18402
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18402
pidgin-yahoo-protocol-dos(66055)
https://exchange.xforce.ibmcloud.com/vulnerabilities/66055
CopyrightCopyright (C) 2012 Greenbone AG

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.