Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.1.10.2016.0408
Kategorie:Mageia Linux Local Security Checks
Titel:Mageia: Security Advisory (MGASA-2016-0408)
Zusammenfassung:The remote host is missing an update for the 'kmod-vboxadditions, kmod-virtualbox, virtualbox' package(s) announced via the MGASA-2016-0408 advisory.
Beschreibung:Summary:
The remote host is missing an update for the 'kmod-vboxadditions, kmod-virtualbox, virtualbox' package(s) announced via the MGASA-2016-0408 advisory.

Vulnerability Insight:
This update provides virtualbox 5.1.10 maintenance release and resolves
at least the following security issues:

OpenSSL through 1.0.2h incorrectly uses pointer arithmetic for heap-buffer
boundary checks, which might allow remote attackers to cause a denial of
service (integer overflow and application crash) or possibly have
unspecified other impact by leveraging unexpected malloc behavior, related
to s3_srvr.c, ssl_sess.c, and t1_lib.c (CVE-2016-2177).

The dsa_sign_setup function in crypto/dsa/dsa_ossl.c in OpenSSL through
1.0.2h does not properly ensure the use of constant-time operations, which
makes it easier for local users to discover a DSA private key via a timing
side-channel attack (CVE-2016-2178).

The DTLS implementation in OpenSSL before 1.1.0 does not properly restrict
the lifetime of queue entries associated with unused out-of-order messages,
which allows remote attackers to cause a denial of service (memory
consumption) by maintaining many crafted DTLS sessions simultaneously,
related to d1_lib.c, statem_dtls.c, statem_lib.c, and statem_srvr.c
(CVE-2016-2179).

The TS_OBJ_print_bio function in crypto/ts/ts_lib.c in the X.509 Public Key
Infrastructure Time-Stamp Protocol (TSP) implementation in OpenSSL through
1.0.2h allows remote attackers to cause a denial of service (out-of-bounds
read and application crash) via a crafted time-stamp file that is mishandled
by the 'openssl ts' command (CVE-2016-2180).

The Anti-Replay feature in the DTLS implementation in OpenSSL before 1.1.0
mishandles early use of a new epoch number in conjunction with a large
sequence number, which allows remote attackers to cause a denial of service
(false-positive packet drops) via spoofed DTLS records, related to
rec_layer_d1.c and ssl3_record.c (CVE-2016-2181).

The Anti-Replay feature in the DTLS implementation in OpenSSL before 1.1.0
mishandles early use of a new epoch number in conjunction with a large
sequence number, which allows remote attackers to cause a denial of service
(false-positive packet drops) via spoofed DTLS records, related to
rec_layer_d1.c and ssl3_record.c (CVE-2016-2182).

The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols
and other protocols and products, have a birthday bound of approximately
four billion blocks, which makes it easier for remote attackers to obtain
cleartext data via a birthday attack against a long-duration encrypted
session, as demonstrated by an HTTPS session using Triple DES in CBC mode,
aka a 'Sweet32' attack (CVE-2016-2183).

Unspecified vulnerability in the Oracle VM VirtualBox component before
5.0.28 and 5.1.x before 5.1.8 in Oracle Virtualization allows local users
to affect confidentiality, integrity, and availability via vectors related
to Core, a different vulnerability than CVE-2016-5538 (CVE-2016-5501).

Unspecified vulnerability in the Oracle VM VirtualBox component before
5.0.28 and 5.1.x before ... [Please see the references for more information on the vulnerabilities]

Affected Software/OS:
'kmod-vboxadditions, kmod-virtualbox, virtualbox' package(s) on Mageia 5.

Solution:
Please install the updated package(s).

CVSS Score:
10.0

CVSS Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2016-2177
BugTraq ID: 91319
http://www.securityfocus.com/bid/91319
Bugtraq: 20170801 [security bulletin] HPESBHF03763 rev.1 - HPE Comware 7, IMC, VCX products using OpenSSL, Remote Denial of Service (DoS) (Google Search)
http://www.securityfocus.com/archive/1/540957/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/540957/100/0/threaded
Cisco Security Advisory: 20160927 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products: September 2016
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160927-openssl
Debian Security Information: DSA-3673 (Google Search)
http://www.debian.org/security/2016/dsa-3673
FreeBSD Security Advisory: FreeBSD-SA-16:27
https://security.FreeBSD.org/advisories/FreeBSD-SA-16:26.openssl.asc
http://seclists.org/fulldisclosure/2017/Jul/31
https://security.gentoo.org/glsa/201612-16
https://ics-cert.us-cert.gov/advisories/ICSA-18-144-01
https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24
http://www.openwall.com/lists/oss-security/2016/06/08/9
RedHat Security Advisories: RHSA-2016:1940
http://rhn.redhat.com/errata/RHSA-2016-1940.html
RedHat Security Advisories: RHSA-2016:2957
http://rhn.redhat.com/errata/RHSA-2016-2957.html
RedHat Security Advisories: RHSA-2017:0193
https://access.redhat.com/errata/RHSA-2017:0193
RedHat Security Advisories: RHSA-2017:0194
https://access.redhat.com/errata/RHSA-2017:0194
RedHat Security Advisories: RHSA-2017:1658
https://access.redhat.com/errata/RHSA-2017:1658
RedHat Security Advisories: RHSA-2017:1659
http://rhn.redhat.com/errata/RHSA-2017-1659.html
http://www.securitytracker.com/id/1036088
SuSE Security Announcement: SUSE-SU-2016:2387 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html
SuSE Security Announcement: SUSE-SU-2016:2394 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html
SuSE Security Announcement: SUSE-SU-2016:2458 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html
SuSE Security Announcement: SUSE-SU-2016:2468 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html
SuSE Security Announcement: SUSE-SU-2016:2469 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html
SuSE Security Announcement: SUSE-SU-2017:2699 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html
SuSE Security Announcement: SUSE-SU-2017:2700 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html
SuSE Security Announcement: openSUSE-SU-2016:2391 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html
SuSE Security Announcement: openSUSE-SU-2016:2407 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html
SuSE Security Announcement: openSUSE-SU-2016:2537 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html
SuSE Security Announcement: openSUSE-SU-2018:0458 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html
http://www.ubuntu.com/usn/USN-3087-1
http://www.ubuntu.com/usn/USN-3087-2
http://www.ubuntu.com/usn/USN-3181-1
Common Vulnerability Exposure (CVE) ID: CVE-2016-2178
BugTraq ID: 91081
http://www.securityfocus.com/bid/91081
http://eprint.iacr.org/2016/594.pdf
http://www.openwall.com/lists/oss-security/2016/06/08/2
http://www.openwall.com/lists/oss-security/2016/06/08/10
http://www.openwall.com/lists/oss-security/2016/06/08/11
http://www.openwall.com/lists/oss-security/2016/06/08/12
http://www.openwall.com/lists/oss-security/2016/06/08/4
http://www.openwall.com/lists/oss-security/2016/06/08/5
http://www.openwall.com/lists/oss-security/2016/06/08/6
http://www.openwall.com/lists/oss-security/2016/06/08/7
http://www.openwall.com/lists/oss-security/2016/06/08/8
http://www.openwall.com/lists/oss-security/2016/06/09/2
http://www.openwall.com/lists/oss-security/2016/06/09/8
http://www.securitytracker.com/id/1036054
SuSE Security Announcement: SUSE-SU-2016:2470 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00013.html
SuSE Security Announcement: openSUSE-SU-2016:2496 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00021.html
Common Vulnerability Exposure (CVE) ID: CVE-2016-2179
BugTraq ID: 92987
http://www.securityfocus.com/bid/92987
http://www.securitytracker.com/id/1036689
Common Vulnerability Exposure (CVE) ID: CVE-2016-2180
BugTraq ID: 92117
http://www.securityfocus.com/bid/92117
http://www.securitytracker.com/id/1036486
Common Vulnerability Exposure (CVE) ID: CVE-2016-2181
BugTraq ID: 92982
http://www.securityfocus.com/bid/92982
http://www.securitytracker.com/id/1036690
Common Vulnerability Exposure (CVE) ID: CVE-2016-2182
BugTraq ID: 92557
http://www.securityfocus.com/bid/92557
RedHat Security Advisories: RHSA-2018:2185
https://access.redhat.com/errata/RHSA-2018:2185
RedHat Security Advisories: RHSA-2018:2186
https://access.redhat.com/errata/RHSA-2018:2186
RedHat Security Advisories: RHSA-2018:2187
https://access.redhat.com/errata/RHSA-2018:2187
http://www.securitytracker.com/id/1036688
http://www.securitytracker.com/id/1037968
Common Vulnerability Exposure (CVE) ID: CVE-2016-2183
1036696
http://www.securitytracker.com/id/1036696
20161207 [security bulletin] HPSBHF03674 rev.1 HPE Comware 5 and Comware 7 Network Products using SSL/TLS, Remote Disclosure of Information
http://www.securityfocus.com/archive/1/539885/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/539885/100/0/threaded
20170214 [security bulletin] HPESBGN03697 rev.1 - HPE Business Service Management (BSM), Remote Disclosure of Information
http://www.securityfocus.com/archive/1/archive/1/540129/100/0/threaded
20170329 [security bulletin] HPESBUX03725 rev.1 - HPE HP-UX Web Server Suite running Apache, Multiple Vulnerabilities
http://www.securityfocus.com/archive/1/540341/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/540341/100/0/threaded
20170529 SSD Advisory - IBM Informix Dynamic Server and Informix Open Admin Tool Multiple Vulnerabilities
http://seclists.org/fulldisclosure/2017/May/105
20170717 Orion Elite Hidden IP Browser Pro - All Versions - Multiple Known Vulnerabilities
20170831 [security bulletin] HPESBGN03765 rev.2 - HPE LoadRunner and HPE Performance Center, Remote Disclosure of Information
http://www.securityfocus.com/archive/1/541104/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/541104/100/0/threaded
20180510 [security bulletin] MFSBGN03805 - HP Service Manager, Remote Disclosure of Information
http://www.securityfocus.com/archive/1/542005/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/542005/100/0/threaded
20181113 [security bulletin] MFSBGN03831 rev. - Service Management Automation, remote disclosure of information
https://seclists.org/bugtraq/2018/Nov/21
42091
https://www.exploit-db.com/exploits/42091/
92630
http://www.securityfocus.com/bid/92630
95568
http://www.securityfocus.com/bid/95568
DSA-3673
GLSA-201612-16
GLSA-201701-65
https://security.gentoo.org/glsa/201701-65
GLSA-201707-01
https://security.gentoo.org/glsa/201707-01
RHSA-2017:0336
http://rhn.redhat.com/errata/RHSA-2017-0336.html
RHSA-2017:0337
http://rhn.redhat.com/errata/RHSA-2017-0337.html
RHSA-2017:0338
http://rhn.redhat.com/errata/RHSA-2017-0338.html
RHSA-2017:0462
http://rhn.redhat.com/errata/RHSA-2017-0462.html
RHSA-2017:1216
https://access.redhat.com/errata/RHSA-2017:1216
RHSA-2017:2708
https://access.redhat.com/errata/RHSA-2017:2708
RHSA-2017:2709
https://access.redhat.com/errata/RHSA-2017:2709
RHSA-2017:2710
https://access.redhat.com/errata/RHSA-2017:2710
RHSA-2017:3113
https://access.redhat.com/errata/RHSA-2017:3113
RHSA-2017:3114
https://access.redhat.com/errata/RHSA-2017:3114
RHSA-2017:3239
https://access.redhat.com/errata/RHSA-2017:3239
RHSA-2017:3240
https://access.redhat.com/errata/RHSA-2017:3240
RHSA-2018:2123
https://access.redhat.com/errata/RHSA-2018:2123
RHSA-2019:1245
https://access.redhat.com/errata/RHSA-2019:1245
RHSA-2019:2859
https://access.redhat.com/errata/RHSA-2019:2859
RHSA-2020:0451
https://access.redhat.com/errata/RHSA-2020:0451
SUSE-SU-2016:2387
SUSE-SU-2016:2394
SUSE-SU-2016:2458
SUSE-SU-2016:2468
SUSE-SU-2016:2469
SUSE-SU-2016:2470
SUSE-SU-2017:0346
http://lists.opensuse.org/opensuse-security-announce/2017-01/msg00068.html
SUSE-SU-2017:0460
http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00023.html
SUSE-SU-2017:0490
http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00028.html
SUSE-SU-2017:1444
http://lists.opensuse.org/opensuse-security-announce/2017-05/msg00076.html
SUSE-SU-2017:2699
SUSE-SU-2017:2700
USN-3087-1
USN-3087-2
USN-3179-1
http://www.ubuntu.com/usn/USN-3179-1
USN-3194-1
http://www.ubuntu.com/usn/USN-3194-1
USN-3198-1
http://www.ubuntu.com/usn/USN-3198-1
USN-3270-1
http://www.ubuntu.com/usn/USN-3270-1
USN-3372-1
http://www.ubuntu.com/usn/USN-3372-1
[tls] 20091120 RC4+3DES rekeying - long-lived TLS connections
https://www.ietf.org/mail-archive/web/tls/current/msg04560.html
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
http://packetstormsecurity.com/files/142756/IBM-Informix-Dynamic-Server-DLL-Injection-Code-Execution.html
http://www-01.ibm.com/support/docview.wss?uid=nas8N1021697
http://www-01.ibm.com/support/docview.wss?uid=swg21991482
http://www-01.ibm.com/support/docview.wss?uid=swg21995039
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html
http://www.splunk.com/view/SP-CAAAPSV
http://www.splunk.com/view/SP-CAAAPUE
https://access.redhat.com/articles/2548661
https://access.redhat.com/security/cve/cve-2016-2183
https://blog.cryptographyengineering.com/2016/08/24/attack-of-week-64-bit-ciphers-in-tls/
https://bto.bluecoat.com/security-advisory/sa133
https://bugzilla.redhat.com/show_bug.cgi?id=1369383
https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
https://github.com/ssllabs/ssllabs-scan/issues/387#issuecomment-242514633
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05302448
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05369403
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05369415
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05385680
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05390722
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05390849
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03765en_us
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03725en_us
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05302448
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05309984
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05323116
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05349499
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05369403
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05369415
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390849
https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312
https://kc.mcafee.com/corporate/index?page=content&id=SB10171
https://kc.mcafee.com/corporate/index?page=content&id=SB10186
https://kc.mcafee.com/corporate/index?page=content&id=SB10197
https://kc.mcafee.com/corporate/index?page=content&id=SB10215
https://kc.mcafee.com/corporate/index?page=content&id=SB10310
https://nakedsecurity.sophos.com/2016/08/25/anatomy-of-a-cryptographic-collision-the-sweet32-attack/
https://nodejs.org/en/blog/vulnerability/september-2016-security-releases/
https://security.netapp.com/advisory/ntap-20160915-0001/
https://security.netapp.com/advisory/ntap-20170119-0001/
https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03158613
https://softwaresupport.softwaregrp.com/document/-/facetsearch/document/KM03286178
https://support.f5.com/csp/article/K13167034
https://sweet32.info/
https://wiki.opendaylight.org/view/Security_Advisories
https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-17-0008
https://www.nccgroup.trust/us/about-us/newsroom-and-events/blog/2016/august/new-practical-attacks-on-64-bit-block-ciphers-3des-blowfish/
https://www.openssl.org/blog/blog/2016/08/24/sweet32/
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
https://www.sigsac.org/ccs/CCS2016/accepted-papers/
https://www.tenable.com/security/tns-2016-16
https://www.tenable.com/security/tns-2016-20
https://www.tenable.com/security/tns-2016-21
https://www.tenable.com/security/tns-2017-09
https://www.teskalabs.com/blog/teskalabs-bulletin-160826-seacat-sweet32-issue
openSUSE-SU-2016:2391
openSUSE-SU-2016:2407
openSUSE-SU-2016:2496
openSUSE-SU-2016:2537
openSUSE-SU-2017:0374
http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00003.html
openSUSE-SU-2017:0513
http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00032.html
openSUSE-SU-2018:0458
Common Vulnerability Exposure (CVE) ID: CVE-2016-5501
BugTraq ID: 93687
http://www.securityfocus.com/bid/93687
http://www.securitytracker.com/id/1037053
Common Vulnerability Exposure (CVE) ID: CVE-2016-5538
BugTraq ID: 93697
http://www.securityfocus.com/bid/93697
Common Vulnerability Exposure (CVE) ID: CVE-2016-5605
BugTraq ID: 93685
http://www.securityfocus.com/bid/93685
Common Vulnerability Exposure (CVE) ID: CVE-2016-5608
BugTraq ID: 93718
http://www.securityfocus.com/bid/93718
https://security.gentoo.org/glsa/201612-27
Common Vulnerability Exposure (CVE) ID: CVE-2016-5610
BugTraq ID: 93711
http://www.securityfocus.com/bid/93711
Common Vulnerability Exposure (CVE) ID: CVE-2016-5611
BugTraq ID: 93744
http://www.securityfocus.com/bid/93744
Common Vulnerability Exposure (CVE) ID: CVE-2016-5613
BugTraq ID: 93728
http://www.securityfocus.com/bid/93728
Common Vulnerability Exposure (CVE) ID: CVE-2016-6302
BugTraq ID: 92628
http://www.securityfocus.com/bid/92628
http://www.securitytracker.com/id/1036885
Common Vulnerability Exposure (CVE) ID: CVE-2016-6303
1036885
92984
http://www.securityfocus.com/bid/92984
FreeBSD-SA-16:26
https://bto.bluecoat.com/security-advisory/sa132
https://bugzilla.redhat.com/show_bug.cgi?id=1370146
https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=55d83bf7c10c7b205fffa23fa7c3977491e56c07
Common Vulnerability Exposure (CVE) ID: CVE-2016-6304
BugTraq ID: 93150
http://www.securityfocus.com/bid/93150
http://seclists.org/fulldisclosure/2016/Oct/62
http://seclists.org/fulldisclosure/2016/Dec/47
http://packetstormsecurity.com/files/139091/OpenSSL-x509-Parsing-Double-Free-Invalid-Free.html
RedHat Security Advisories: RHSA-2016:2802
http://rhn.redhat.com/errata/RHSA-2016-2802.html
RedHat Security Advisories: RHSA-2017:1413
https://access.redhat.com/errata/RHSA-2017:1413
RedHat Security Advisories: RHSA-2017:1414
https://access.redhat.com/errata/RHSA-2017:1414
RedHat Security Advisories: RHSA-2017:1415
http://rhn.redhat.com/errata/RHSA-2017-1415.html
RedHat Security Advisories: RHSA-2017:1801
https://access.redhat.com/errata/RHSA-2017:1801
RedHat Security Advisories: RHSA-2017:1802
https://access.redhat.com/errata/RHSA-2017:1802
RedHat Security Advisories: RHSA-2017:2493
https://access.redhat.com/errata/RHSA-2017:2493
RedHat Security Advisories: RHSA-2017:2494
https://access.redhat.com/errata/RHSA-2017:2494
http://www.securitytracker.com/id/1036878
http://www.securitytracker.com/id/1037640
SuSE Security Announcement: openSUSE-SU-2016:2769 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-11/msg00021.html
SuSE Security Announcement: openSUSE-SU-2016:2788 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-11/msg00027.html
Common Vulnerability Exposure (CVE) ID: CVE-2016-6305
BugTraq ID: 93149
http://www.securityfocus.com/bid/93149
http://www.securitytracker.com/id/1036879
Common Vulnerability Exposure (CVE) ID: CVE-2016-6306
BugTraq ID: 93153
http://www.securityfocus.com/bid/93153
https://git.openssl.org/?p=openssl.git;a=commit;h=52e623c4cb06fffa9d5e75c60b34b4bc130b12e9
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03856en_us
https://www.openssl.org/news/secadv/20160922.txt
Common Vulnerability Exposure (CVE) ID: CVE-2016-6307
BugTraq ID: 93152
http://www.securityfocus.com/bid/93152
Common Vulnerability Exposure (CVE) ID: CVE-2016-6308
BugTraq ID: 93151
http://www.securityfocus.com/bid/93151
Common Vulnerability Exposure (CVE) ID: CVE-2016-6309
BugTraq ID: 93177
http://www.securityfocus.com/bid/93177
Common Vulnerability Exposure (CVE) ID: CVE-2016-7052
BugTraq ID: 93171
http://www.securityfocus.com/bid/93171
https://security.FreeBSD.org/advisories/FreeBSD-SA-16:27.openssl.asc
CopyrightCopyright (C) 2022 Greenbone AG

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.