Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.1.10.2014.0154
Kategorie:Mageia Linux Local Security Checks
Titel:Mageia: Security Advisory (MGASA-2014-0154)
Zusammenfassung:The remote host is missing an update for the 'perl-YAML-LibYAML' package(s) announced via the MGASA-2014-0154 advisory.
Beschreibung:Summary:
The remote host is missing an update for the 'perl-YAML-LibYAML' package(s) announced via the MGASA-2014-0154 advisory.

Vulnerability Insight:
Updated perl-YAML-LibYAML packages fix security vulnerabilities:

Florian Weimer of the Red Hat Product Security Team discovered a heap-based
buffer overflow flaw in LibYAML, a fast YAML 1.1 parser and emitter library.
A remote attacker could provide a YAML document with a specially-crafted tag
that, when parsed by an application using libyaml, would cause the application
to crash or, potentially, execute arbitrary code with the privileges of the
user running the application (CVE-2013-6393).

Ivan Fratric of the Google Security Team discovered a heap-based buffer
overflow vulnerability in LibYAML, a fast YAML 1.1 parser and emitter
library. A remote attacker could provide a specially-crafted YAML document
that, when parsed by an application using libyaml, would cause the application
to crash or, potentially, execute arbitrary code with the privileges of the
user running the application (CVE-2014-2525).

The perl-YAML-LibYAML package is being updated as it contains an embedded copy
of LibYAML.

Affected Software/OS:
'perl-YAML-LibYAML' package(s) on Mageia 3, Mageia 4.

Solution:
Please install the updated package(s).

CVSS Score:
6.8

CVSS Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2013-6393
http://archives.neohapsis.com/archives/bugtraq/2014-04/0134.html
http://archives.neohapsis.com/archives/bugtraq/2014-10/0103.html
BugTraq ID: 65258
http://www.securityfocus.com/bid/65258
Debian Security Information: DSA-2850 (Google Search)
http://www.debian.org/security/2014/dsa-2850
Debian Security Information: DSA-2870 (Google Search)
http://www.debian.org/security/2014/dsa-2870
http://www.mandriva.com/security/advisories?name=MDVSA-2015:060
https://bugzilla.redhat.com/attachment.cgi?id=847926&action=diff
http://osvdb.org/102716
RedHat Security Advisories: RHSA-2014:0353
http://rhn.redhat.com/errata/RHSA-2014-0353.html
RedHat Security Advisories: RHSA-2014:0354
http://rhn.redhat.com/errata/RHSA-2014-0354.html
RedHat Security Advisories: RHSA-2014:0355
http://rhn.redhat.com/errata/RHSA-2014-0355.html
SuSE Security Announcement: openSUSE-SU-2014:0272 (Google Search)
http://lists.opensuse.org/opensuse-updates/2014-02/msg00064.html
SuSE Security Announcement: openSUSE-SU-2014:0273 (Google Search)
http://lists.opensuse.org/opensuse-updates/2014-02/msg00065.html
SuSE Security Announcement: openSUSE-SU-2015:0319 (Google Search)
http://lists.opensuse.org/opensuse-updates/2015-02/msg00078.html
SuSE Security Announcement: openSUSE-SU-2016:1067 (Google Search)
http://lists.opensuse.org/opensuse-updates/2016-04/msg00050.html
http://www.ubuntu.com/usn/USN-2098-1
Common Vulnerability Exposure (CVE) ID: CVE-2014-2525
BugTraq ID: 66478
http://www.securityfocus.com/bid/66478
Debian Security Information: DSA-2884 (Google Search)
http://www.debian.org/security/2014/dsa-2884
Debian Security Information: DSA-2885 (Google Search)
http://www.debian.org/security/2014/dsa-2885
http://www.ocert.org/advisories/ocert-2014-003.html
http://secunia.com/advisories/57836
http://secunia.com/advisories/57966
http://secunia.com/advisories/57968
SuSE Security Announcement: openSUSE-SU-2014:0500 (Google Search)
http://lists.opensuse.org/opensuse-updates/2014-04/msg00022.html
http://www.ubuntu.com/usn/USN-2160-1
CopyrightCopyright (C) 2022 Greenbone AG

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.