Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.1.10.2024.0134
Kategorie:Mageia Linux Local Security Checks
Titel:Mageia: Security Advisory (MGASA-2024-0134)
Zusammenfassung:The remote host is missing an update for the 'upx' package(s) announced via the MGASA-2024-0134 advisory.
Beschreibung:Summary:
The remote host is missing an update for the 'upx' package(s) announced via the MGASA-2024-0134 advisory.

Vulnerability Insight:
A vulnerability was found in UPX up to 4.2.2. It has been rated as
critical. This issue affects the function get_ne64 of the file bele.h.
The manipulation leads to heap-based buffer overflow. The exploit has
been disclosed to the public and may be used. The associated identifier
of this vulnerability is VDB-259055. NOTE: The vendor was contacted
early about this disclosure but did not respond in any way.

Affected Software/OS:
'upx' package(s) on Mageia 9.

Solution:
Please install the updated package(s).

CVSS Score:
5.0

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:N/A:N

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2024-3209
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J4DNK3AFPT4KIPTBKGCJ6FC3L7AWI2TN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AE5OZ7YUEVLXVVS6PFP5RELVICQ4K6QK/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZHWZN2NX5W3WYA6ACJ746PAZXXNZETKD/
Submit #304575 | UPX upx commit 06b0de9c77551cd4e856d453e094d8a0b6ef0d6d heap buffer overflow
https://vuldb.com/?submit.304575
VDB-259055 | CTI Indicators (IOB, IOC, IOA)
https://vuldb.com/?ctiid.259055
VDB-259055 | UPX bele.h get_ne64 heap-based overflow
https://vuldb.com/?id.259055
https://drive.google.com/drive/folders/1qlUXvycOzGJygfkdQB9dGO6VwNRRZoih?usp=sharing
CopyrightCopyright (C) 2024 Greenbone AG

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.