![]() |
Startseite ▼ Bookkeeping
Online ▼ Sicherheits
Überprüfungs ▼
Verwaltetes
DNS ▼
Info
Bestellen/Erneuern
FAQ
AUP
Dynamic DNS Clients
Domaine konfigurieren Dyanmic DNS Update Password Netzwerk
Überwachung ▼
Enterprise
Erweiterte
Standard
Gratis Test
FAQ
Preis/Funktionszusammenfassung
Bestellen
Beispiele
Konfigurieren/Status Alarm Profile | ||
Test Kennung: | 1.3.6.1.4.1.25623.1.1.10.2013.0353 |
Kategorie: | Mageia Linux Local Security Checks |
Titel: | Mageia: Security Advisory (MGASA-2013-0353) |
Zusammenfassung: | The remote host is missing an update for the 'pdns, polarssl, ragel' package(s) announced via the MGASA-2013-0353 advisory. |
Beschreibung: | Summary: The remote host is missing an update for the 'pdns, polarssl, ragel' package(s) announced via the MGASA-2013-0353 advisory. Vulnerability Insight: Updated polarssl packages fix security vulnerability: The researchers Cyril Arnaud and Pierre-Alain Fouque investigated the PolarSSL RSA implementation and discovered a bias in the implementation of the Montgomery multiplication that we used. For which they then show that it can be used to mount an attack on the RSA key. Although their test attack is done on a local system, there seems to be enough indication that this can properly be performed from a remote system as well (CVE-2013-5915). Also, the pdns package has been updated to work with the updated polarssl. Affected Software/OS: 'pdns, polarssl, ragel' package(s) on Mageia 3. Solution: Please install the updated package(s). CVSS Score: 4.3 CVSS Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N |
Querverweis: |
Common Vulnerability Exposure (CVE) ID: CVE-2013-5915 BugTraq ID: 62771 http://www.securityfocus.com/bid/62771 Debian Security Information: DSA-2782 (Google Search) http://www.debian.org/security/2013/dsa-2782 http://lists.fedoraproject.org/pipermail/package-announce/2013-October/118758.html http://lists.fedoraproject.org/pipermail/package-announce/2013-October/119014.html http://lists.fedoraproject.org/pipermail/package-announce/2013-October/119018.html http://osvdb.org/98049 http://secunia.com/advisories/55084 |
Copyright | Copyright (C) 2022 Greenbone AG |
Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus. Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten. |