Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.1.10.2014.0460
Kategorie:Mageia Linux Local Security Checks
Titel:Mageia: Security Advisory (MGASA-2014-0460)
Zusammenfassung:The remote host is missing an update for the 'boinc-client' package(s) announced via the MGASA-2014-0460 advisory.
Beschreibung:Summary:
The remote host is missing an update for the 'boinc-client' package(s) announced via the MGASA-2014-0460 advisory.

Vulnerability Insight:
Multiple stack overflow flaws were found in the way the XML parser of
boinc-client, a Berkeley Open Infrastructure for Network Computing (BOINC)
client for distributed computing, performed processing of certain XML files.
A rogue BOINC server could provide a specially-crafted XML file that, when
processed would lead to boinc-client executable crash (CVE-2013-2298).

Issues preventing the boinc-client service from working immediately after
installation have been fixed as well.

Affected Software/OS:
'boinc-client' package(s) on Mageia 3, Mageia 4.

Solution:
Please install the updated package(s).

CVSS Score:
9.3

CVSS Vector:
AV:N/AC:M/Au:N/C:C/I:C/A:C

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2013-2298
BugTraq ID: 59539
http://www.securityfocus.com/bid/59539
http://lists.fedoraproject.org/pipermail/package-announce/2013-December/125128.html
http://lists.fedoraproject.org/pipermail/package-announce/2013-December/125125.html
http://thread.gmane.org/gmane.comp.distributed.boinc.user/3741
http://www.openwall.com/lists/oss-security/2013/04/28/3
http://secunia.com/advisories/53192
XForce ISS Database: boinc-cve20132298-bo(83931)
https://exchange.xforce.ibmcloud.com/vulnerabilities/83931
CopyrightCopyright (C) 2022 Greenbone AG

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.