Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.1.10.2014.0291
Kategorie:Mageia Linux Local Security Checks
Titel:Mageia: Security Advisory (MGASA-2014-0291)
Zusammenfassung:The remote host is missing an update for the 'flash-player-plugin' package(s) announced via the MGASA-2014-0291 advisory.
Beschreibung:Summary:
The remote host is missing an update for the 'flash-player-plugin' package(s) announced via the MGASA-2014-0291 advisory.

Vulnerability Insight:
Adobe Flash Player 11.2.202.394 contains fixes to critical security
vulnerabilities found in earlier versions that could potentially allow an
attacker to take control of the affected system.

This update includes additional validation checks to ensure that Flash Player
rejects malicious content from vulnerable JSONP callback APIs (CVE-2014-4671).

This update resolves security bypass vulnerabilities
(CVE-2014-0537, CVE-2014-0539).

Affected Software/OS:
'flash-player-plugin' package(s) on Mageia 3, Mageia 4.

Solution:
Please install the updated package(s).

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2014-0537
BugTraq ID: 68455
http://www.securityfocus.com/bid/68455
http://security.gentoo.org/glsa/glsa-201407-02.xml
RedHat Security Advisories: RHSA-2014:0860
http://rhn.redhat.com/errata/RHSA-2014-0860.html
http://www.securitytracker.com/id/1030533
http://secunia.com/advisories/59774
http://secunia.com/advisories/59837
Common Vulnerability Exposure (CVE) ID: CVE-2014-0539
BugTraq ID: 68454
http://www.securityfocus.com/bid/68454
Common Vulnerability Exposure (CVE) ID: CVE-2014-4671
BugTraq ID: 68457
http://www.securityfocus.com/bid/68457
http://miki.it/blog/2014/7/8/abusing-jsonp-with-rosetta-flash/
CopyrightCopyright (C) 2022 Greenbone AG

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.