Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.70729
Kategorie:FreeBSD Local Security Checks
Titel:FreeBSD Ports: bip
Zusammenfassung:The remote host is missing an update to the system; as announced in the referenced advisory.
Beschreibung:Summary:
The remote host is missing an update to the system
as announced in the referenced advisory.

Vulnerability Insight:
The following package is affected: bip

CVE-2012-0806
Buffer overflow in Bip 0.8.8 and earlier might allow remote
authenticated users to execute arbitrary code via vectors involving a
series of TCP connections that triggers use of many open file
descriptors.

Solution:
Update your system with the appropriate patches or
software upgrades.

CVSS Score:
6.5

CVSS Vector:
AV:N/AC:L/Au:S/C:P/I:P/A:P

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2012-0806
47679
http://secunia.com/advisories/47679
FEDORA-2012-0916
http://lists.fedoraproject.org/pipermail/package-announce/2012-February/072767.html
FEDORA-2012-0941
http://lists.fedoraproject.org/pipermail/package-announce/2012-February/072752.html
MDVSA-2013:063
http://www.mandriva.com/security/advisories?name=MDVSA-2013:063
[oss-security] 20120124 CVE request: bip buffer overflow
http://openwall.com/lists/oss-security/2012/01/24/4
[oss-security] 20120124 Re: CVE request: bip buffer overflow
http://openwall.com/lists/oss-security/2012/01/24/10
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=657217
https://projects.duckcorp.org/issues/269
https://projects.duckcorp.org/projects/bip/repository/revisions/222a33cb84a2e52ad55a88900b7895bf9dd0262c
CopyrightCopyright (C) 2012 E-Soft Inc.

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.