Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.52128
Categoría:FreeBSD Local Security Checks
Título:FreeBSD Ports: junkbuster
Resumen:The remote host is missing an update to the system; as announced in the referenced advisory.
Descripción:Summary:
The remote host is missing an update to the system
as announced in the referenced advisory.

Vulnerability Insight:
The following packages are affected:

junkbuster
junkbuster-zlib

CVE-2005-1108
The ij_untrusted_url function in JunkBuster 2.0.2-r2, with
single-threaded mode enabled, allows remote attackers to overwrite the
referrer field via a crafted HTTP request.

CVE-2005-1109
The filtering of URLs in JunkBuster before 2.0.2-r3 allows remote
attackers to cause a denial of service (application crash) and
possibly execute arbitrary code via heap corruption.

Solution:
Update your system with the appropriate patches or
software upgrades.

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2005-1108
BugTraq ID: 13147
http://www.securityfocus.com/bid/13147
Debian Security Information: DSA-713 (Google Search)
http://www.debian.org/security/2005/dsa-713
http://www.gentoo.org/security/en/glsa/glsa-200504-11.xml
http://bugs.gentoo.org/show_bug.cgi?id=88537
http://www.osvdb.org/15502
http://secunia.com/advisories/14932/
XForce ISS Database: junkbuster-ijuntrustedurl-gain-access(20093)
https://exchange.xforce.ibmcloud.com/vulnerabilities/20093
Common Vulnerability Exposure (CVE) ID: CVE-2005-1109
BugTraq ID: 13146
http://www.securityfocus.com/bid/13146
http://www.osvdb.org/15503
XForce ISS Database: junkbuster-heap-corruption(20094)
https://exchange.xforce.ibmcloud.com/vulnerabilities/20094
CopyrightCopyright (C) 2008 E-Soft Inc.

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.