Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.1.10.2016.0257
Kategorie:Mageia Linux Local Security Checks
Titel:Mageia: Security Advisory (MGASA-2016-0257)
Zusammenfassung:The remote host is missing an update for the 'converseen, cuneiform-linux, imagemagick, inkscape, k3d, kcm-grub2, kxstitch, performous, perl-Image-SubImageFind, pfstools, pstoedit, pythonmagick, synfig, vdr-plugin-skinelchi, vdr-plugin-skinenigmang' package(s) announced via the MGASA-2016-0257 advisory.
Beschreibung:Summary:
The remote host is missing an update for the 'converseen, cuneiform-linux, imagemagick, inkscape, k3d, kcm-grub2, kxstitch, performous, perl-Image-SubImageFind, pfstools, pstoedit, pythonmagick, synfig, vdr-plugin-skinelchi, vdr-plugin-skinenigmang' package(s) announced via the MGASA-2016-0257 advisory.

Vulnerability Insight:
Updated imagemagick package fixes security vulnerabilities:

The OpenBlob function in blob.c in ImageMagick allows remote attackers to
execute arbitrary code via a (pipe) character at the start of a filename
(CVE-2016-5118).

Integer overflow in MagickCore/profile.c (CVE-2016-5841).

Buffer overread in MagickCore/property.c (CVE-2016-5842).

Also, several packages have been rebuilt to use the updated Magick++-6.Q16
library. These include converseen, cuneiform-linux, inkscape, k3d, kcm-grub2,
kxstitch, performous, perl-Image-SubImageFind, pfstools, pstoedit,
pythonmagick, synfig, vdr-plugin-skinelchi, and vdr-plugin-skinenigmang.

Affected Software/OS:
'converseen, cuneiform-linux, imagemagick, inkscape, k3d, kcm-grub2, kxstitch, performous, perl-Image-SubImageFind, pfstools, pstoedit, pythonmagick, synfig, vdr-plugin-skinelchi, vdr-plugin-skinenigmang' package(s) on Mageia 5.

Solution:
Please install the updated package(s).

CVSS Score:
10.0

CVSS Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2016-5118
BugTraq ID: 90938
http://www.securityfocus.com/bid/90938
Debian Security Information: DSA-3591 (Google Search)
http://www.debian.org/security/2016/dsa-3591
Debian Security Information: DSA-3746 (Google Search)
http://www.debian.org/security/2016/dsa-3746
http://www.openwall.com/lists/oss-security/2016/05/29/7
http://www.openwall.com/lists/oss-security/2016/05/30/1
RedHat Security Advisories: RHSA-2016:1237
https://access.redhat.com/errata/RHSA-2016:1237
http://www.securitytracker.com/id/1035984
http://www.securitytracker.com/id/1035985
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.397749
SuSE Security Announcement: SUSE-SU-2016:1570 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00021.html
SuSE Security Announcement: SUSE-SU-2016:1610 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00030.html
SuSE Security Announcement: SUSE-SU-2016:1614 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00032.html
SuSE Security Announcement: openSUSE-SU-2016:1521 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00008.html
SuSE Security Announcement: openSUSE-SU-2016:1522 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00009.html
SuSE Security Announcement: openSUSE-SU-2016:1534 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00011.html
SuSE Security Announcement: openSUSE-SU-2016:1653 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00047.html
http://www.ubuntu.com/usn/USN-2990-1
Common Vulnerability Exposure (CVE) ID: CVE-2016-5841
BugTraq ID: 91394
http://www.securityfocus.com/bid/91394
http://www.openwall.com/lists/oss-security/2016/06/23/1
http://www.openwall.com/lists/oss-security/2016/06/25/3
Common Vulnerability Exposure (CVE) ID: CVE-2016-5842
https://security.gentoo.org/glsa/201611-21
CopyrightCopyright (C) 2022 Greenbone AG

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.