Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.1.10.2017.0239
Kategorie:Mageia Linux Local Security Checks
Titel:Mageia: Security Advisory (MGASA-2017-0239)
Zusammenfassung:The remote host is missing an update for the 'spice, spice-protocol' package(s) announced via the MGASA-2017-0239 advisory.
Beschreibung:Summary:
The remote host is missing an update for the 'spice, spice-protocol' package(s) announced via the MGASA-2017-0239 advisory.

Vulnerability Insight:
A vulnerability was discovered in spice, in the server's protocol handling. An
authenticated attacker could send specially crafted messages to the spice
server, causing out-of-bounds memory accesses leading to parts of server memory
being leaked or a crash (CVE-2017-7506).

The Mageia 5 package has been patched to fix this issue. The Mageia 6 package
has been updated to version 0.13.90, containing fixes for this and several other
issues.

Affected Software/OS:
'spice, spice-protocol' package(s) on Mageia 5, Mageia 6.

Solution:
Please install the updated package(s).

CVSS Score:
6.5

CVSS Vector:
AV:N/AC:L/Au:S/C:P/I:P/A:P

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2017-7506
99583
http://www.securityfocus.com/bid/99583
DSA-3907
http://www.debian.org/security/2017/dsa-3907
RHSA-2017:2471
https://access.redhat.com/errata/RHSA-2017:2471
RHSA-2018:3522
https://access.redhat.com/errata/RHSA-2018:3522
[oss-security] 20170714 CVE-2017-7506 spice: Possible buffer overflow via invalid monitor configurations
http://www.openwall.com/lists/oss-security/2017/07/14/1
https://bugzilla.redhat.com/show_bug.cgi?id=1452606
CopyrightCopyright (C) 2022 Greenbone AG

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.