Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.1.10.2016.0301
Kategorie:Mageia Linux Local Security Checks
Titel:Mageia: Security Advisory (MGASA-2016-0301)
Zusammenfassung:The remote host is missing an update for the 'dropbear' package(s) announced via the MGASA-2016-0301 advisory.
Beschreibung:Summary:
The remote host is missing an update for the 'dropbear' package(s) announced via the MGASA-2016-0301 advisory.

Vulnerability Insight:
Message printout was vulnerable to format string injection.

If specific usernames including '%' symbols can be created on a system
(validated by getpwnam()) then an attacker could run arbitrary code as
root when connecting to Dropbear server. Also, a dbclient user who can
control username or host arguments could potentially run arbitrary code
as the dbclient user. This could be a problem if scripts or webpages
pass untrusted input to the dbclient program (CVE-2016-7406).

dropbearconvert import of OpenSSH keys could run arbitrary code as the
local dropbearconvert user when parsing malicious key files
(CVE-2016-7607).

dbclient could run arbitrary code as the local dbclient user if
particular -m or -c arguments are provided. This could be an issue where
dbclient is used in scripts (CVE-2016-7408).

Affected Software/OS:
'dropbear' package(s) on Mageia 5.

Solution:
Please install the updated package(s).

CVSS Score:
10.0

CVSS Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2016-7406
BugTraq ID: 92974
http://www.securityfocus.com/bid/92974
https://security.gentoo.org/glsa/201702-23
http://www.openwall.com/lists/oss-security/2016/09/15/2
Common Vulnerability Exposure (CVE) ID: CVE-2016-7407
BugTraq ID: 92972
http://www.securityfocus.com/bid/92972
Common Vulnerability Exposure (CVE) ID: CVE-2016-7408
BugTraq ID: 92970
http://www.securityfocus.com/bid/92970
CopyrightCopyright (C) 2022 Greenbone AG

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.