Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 146377 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.1.10.2023.0263
Kategorie:Mageia Linux Local Security Checks
Titel:Mageia: Security Advisory (MGASA-2023-0263)
Zusammenfassung:The remote host is missing an update for the 'curl' package(s) announced via the MGASA-2023-0263 advisory.
Beschreibung:Summary:
The remote host is missing an update for the 'curl' package(s) announced via the MGASA-2023-0263 advisory.

Vulnerability Insight:
TELNET option IAC injection. (CVE-2023-27533)

SFTP path ~
resolving discrepancy. (CVE-2023-27534)

FTP too eager connection reuse. (CVE-2023-27535)

GSS delegation too eager connection re-use. (CVE-2023-27536)

HSTS double free. (CVE-2023-27537)

SSH connection too eager reuse still. (CVE-2023-27538)

UAF in SSH sha256 fingerprint check. (CVE-2023-28319)

siglongjmp race condition. (CVE-2023-28320)

IDN wildcard match. (CVE-2023-28321)

more POST-after-PUT confusion. (CVE-2023-28322)

HTTP headers eat all memory. (CVE-2023-38039)

Affected Software/OS:
'curl' package(s) on Mageia 8, Mageia 9.

Solution:
Please install the updated package(s).

CVSS Score:
9.0

CVSS Vector:
AV:N/AC:L/Au:S/C:C/I:C/A:C

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2023-27533
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/
https://security.gentoo.org/glsa/202310-12
https://hackerone.com/reports/1891474
https://lists.debian.org/debian-lts-announce/2023/04/msg00025.html
Common Vulnerability Exposure (CVE) ID: CVE-2023-27534
https://hackerone.com/reports/1892351
https://lists.debian.org/debian-lts-announce/2024/03/msg00016.html
Common Vulnerability Exposure (CVE) ID: CVE-2023-27535
https://hackerone.com/reports/1892780
Common Vulnerability Exposure (CVE) ID: CVE-2023-27536
https://hackerone.com/reports/1895135
Common Vulnerability Exposure (CVE) ID: CVE-2023-27537
https://hackerone.com/reports/1897203
Common Vulnerability Exposure (CVE) ID: CVE-2023-27538
https://hackerone.com/reports/1898475
Common Vulnerability Exposure (CVE) ID: CVE-2023-28319
http://seclists.org/fulldisclosure/2023/Jul/47
http://seclists.org/fulldisclosure/2023/Jul/48
http://seclists.org/fulldisclosure/2023/Jul/52
https://hackerone.com/reports/1913733
Common Vulnerability Exposure (CVE) ID: CVE-2023-28320
https://hackerone.com/reports/1929597
Common Vulnerability Exposure (CVE) ID: CVE-2023-28321
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F4I75RDGX5ULSSCBE5BF3P5I5SFO7ULQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z2LIWHWKOVH24COGGBCVOWDXXIUPKOMK/
https://hackerone.com/reports/1950627
https://lists.debian.org/debian-lts-announce/2023/10/msg00016.html
Common Vulnerability Exposure (CVE) ID: CVE-2023-28322
https://hackerone.com/reports/1954658
https://lists.debian.org/debian-lts-announce/2023/12/msg00015.html
Common Vulnerability Exposure (CVE) ID: CVE-2023-38039
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5DCZMYODALBLVOXVJEN2LF2MLANEYL4F/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M6KGKB2JNZVT276JYSKI6FV2VFJUGDOJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TEAWTYHC3RT6ZRS5OZRHLAIENVN6CCIS/
http://seclists.org/fulldisclosure/2023/Oct/17
http://seclists.org/fulldisclosure/2024/Jan/34
http://seclists.org/fulldisclosure/2024/Jan/37
http://seclists.org/fulldisclosure/2024/Jan/38
https://www.insyde.com/security-pledge/SA-2023064
https://hackerone.com/reports/2072338
CopyrightCopyright (C) 2023 Greenbone AG

Dies ist nur einer von 146377 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.