Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.51985
Categoría:Red Hat Local Security Checks
Título:RedHat Security Advisory RHSA-2005:344
Resumen:NOSUMMARY
Descripción:Description:

The remote host is missing updates announced in
advisory RHSA-2005:344.

The gtk2 package contains the GIMP ToolKit (GTK+), a library for creating
graphical user interfaces for the X Window System.

A bug was found in the way gtk2 processes BMP images. It is possible
that a specially crafted BMP image could cause a denial of service attack
on applications linked against gtk2. The Common Vulnerabilities and
Exposures project (cve.mitre.org) has assigned the name CVE-2005-0891 to
this issue.

Users of gtk2 are advised to upgrade to these packages, which contain
a backported patch and is not vulnerable to this issue.

Solution:
Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date

http://rhn.redhat.com/errata/RHSA-2005-344.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0891

Risk factor : Medium

CVSS Score:
5.0

Referencia Cruzada: BugTraq ID: 12950
Common Vulnerability Exposure (CVE) ID: CVE-2005-0891
12950
http://www.securityfocus.com/bid/12950
17657
http://secunia.com/advisories/17657
CLSA-2005:958
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000958
FLSA-2005:155510
http://www.securityfocus.com/archive/1/419771/100/0/threaded
MDKSA-2005:214
http://www.mandriva.com/security/advisories?name=MDKSA-2005:214
RHSA-2005:343
http://www.redhat.com/support/errata/RHSA-2005-343.html
RHSA-2005:344
http://www.redhat.com/support/errata/RHSA-2005-344.html
oval:org.mitre.oval:def:9710
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9710
CopyrightCopyright (c) 2005 E-Soft Inc. http://www.securityspace.com

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.