![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.120043 |
Categoría: | Amazon Linux Local Security Checks |
Título: | Amazon Linux: Security Advisory (ALAS-2014-338) |
Resumen: | The remote host is missing an update for the 'cyrus-sasl' package(s) announced via the ALAS-2014-338 advisory. |
Descripción: | Summary: The remote host is missing an update for the 'cyrus-sasl' package(s) announced via the ALAS-2014-338 advisory. Vulnerability Insight: Cyrus SASL 2.1.23, 2.1.26, and earlier does not properly handle when a NULL value is returned upon an error by the crypt function as implemented in glibc 2.17 and later, which allows remote attackers to cause a denial of service (thread crash and consumption) via (1) an invalid salt or, when FIPS-140 is enabled, a (2) DES or (3) MD5 encrypted password, which triggers a NULL pointer dereference. Affected Software/OS: 'cyrus-sasl' package(s) on Amazon Linux. Solution: Please install the updated package(s). CVSS Score: 4.3 CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2013-4122 DSA-3368 http://www.debian.org/security/2015/dsa-3368 GLSA-201309-01 http://security.gentoo.org/glsa/glsa-201309-01.xml USN-2755-1 http://www.ubuntu.com/usn/USN-2755-1 [oss-security] 20130712 CVE request: Cyrus-sasl NULL ptr. dereference http://www.openwall.com/lists/oss-security/2013/07/12/3 [oss-security] 20130712 Re: CVE request: Cyrus-sasl NULL ptr. dereference http://www.openwall.com/lists/oss-security/2013/07/12/6 [oss-security] 20130713 Re: CVE request: Cyrus-sasl NULL ptr. dereference http://www.openwall.com/lists/oss-security/2013/07/13/1 [oss-security] 20130715 Re: CVE request: Cyrus-sasl NULL ptr. dereference http://www.openwall.com/lists/oss-security/2013/07/15/1 http://git.cyrusimap.org/cyrus-sasl/commit/?id=dedad73e5e7a75d01a5f3d5a6702ab8ccd2ff40d https://www.linuxquestions.org/questions/slackware-14/%5Bslackware-current%5D-glibc-2-17-shadow-and-other-penumbrae-4175461061/ |
Copyright | Copyright (C) 2015 Greenbone AG |
Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |