Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.1.10.2017.0314
Kategorie:Mageia Linux Local Security Checks
Titel:Mageia: Security Advisory (MGASA-2017-0314)
Zusammenfassung:The remote host is missing an update for the 'flash-player-plugin' package(s) announced via the MGASA-2017-0314 advisory.
Beschreibung:Summary:
The remote host is missing an update for the 'flash-player-plugin' package(s) announced via the MGASA-2017-0314 advisory.

Vulnerability Insight:
This update upgrades Flash Player to version 26.0.0.151.

Security Fix(es):
* This update fixes multiple vulnerabilities in Adobe Flash Player.
These vulnerabilities, detailed in the Adobe Security Bulletin listed in
the References section, could allow an attacker to create a specially
crafted SWF file that would cause flash-plugin to crash, execute
arbitrary code, or disclose sensitive information when the victim loaded
a page containing the malicious SWF content.
(CVE-2017-3085, CVE-2017-3106)

Affected Software/OS:
'flash-player-plugin' package(s) on Mageia 5, Mageia 6.

Solution:
Please install the updated package(s).

CVSS Score:
9.3

CVSS Vector:
AV:N/AC:M/Au:N/C:C/I:C/A:C

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2017-3085
BugTraq ID: 100191
http://www.securityfocus.com/bid/100191
https://security.gentoo.org/glsa/201709-16
http://www.zerodayinitiative.com/advisories/ZDI-17-634/
https://blog.bjornweb.nl/2017/08/flash-remote-sandbox-escape-windows-user-credentials-leak/
RedHat Security Advisories: RHSA-2017:2457
https://access.redhat.com/errata/RHSA-2017:2457
http://www.securitytracker.com/id/1039088
Common Vulnerability Exposure (CVE) ID: CVE-2017-3106
BugTraq ID: 100190
http://www.securityfocus.com/bid/100190
https://www.exploit-db.com/exploits/42480/
CopyrightCopyright (C) 2022 Greenbone AG

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.