Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.72119
Kategorie:Mandrake Local Security Checks
Titel:Mandriva Security Advisory MDVSA-2012:137 (acpid)
Zusammenfassung:NOSUMMARY
Beschreibung:Description:
The remote host is missing an update to acpid
announced via advisory MDVSA-2012:137.

Multiple vulnerabilities has been discovered and corrected in acpid:

Oliver-Tobias Ripka discovered that an ACPI script incorrectly handled
power button events. A local attacker could use this to execute
arbitrary code, and possibly escalate privileges (CVE-2011-2777).

Helmut Grohne and Michael Biebl discovered that ACPI scripts were
executed with a permissive file mode creation mask (umask). A local
attacker could read files and modify directories created by ACPI
scripts that did not set a strict umask (CVE-2011-4578).

The updated packages have been patched to correct these issues.

Affected: 2011.

Solution:
To upgrade automatically use MandrakeUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

http://www.securityspace.com/smysecure/catid.html?in=MDVSA-2012:137

Risk factor : High

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2011-2777
Common Vulnerability Exposure (CVE) ID: CVE-2011-4578
MDVSA-2012:138
http://www.mandriva.com/security/advisories?name=MDVSA-2012:138
[oss-security] 20111206 Re: CVE request: acpid
http://www.openwall.com/lists/oss-security/2011/12/06/3
http://sourceforge.net/u/tedfelix/acpid2/ci/02d0bf29207f17996936ab652717855b15873901/tree/Changelog?force=True
https://bugs.launchpad.net/ubuntu/+source/acpid/+bug/893821
https://bugzilla.redhat.com/show_bug.cgi?id=760984
CopyrightCopyright (c) 2012 E-Soft Inc. http://www.securityspace.com

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.