Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | |||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.53748 |
Categoría: | Debian Local Security Checks |
Título: | Debian Security Advisory DSA 695-1 (xli) |
Resumen: | NOSUMMARY |
Descripción: | Description: The remote host is missing an update to xli announced via advisory DSA 695-1. Several vulnerabilities have been discovered in xli, an image viewer for X11. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2001-0775 A buffer overflow in the decoder for FACES format images could be exploited by an attacker to execute arbitrary code. This problem has been fixed in xloadimage in DSA 069 already. CVE-2005-0638 Tavis Ormandy of the Gentoo Linux Security Audit Team has reported a flaw in the handling of compressed images, where shell meta-characters are not adequately escaped. CVE-2005-0639 Insufficient validation of image properties in have been discovered which could potentially result in buffer management errors. For the stable distribution (woody) these problems have been fixed in version 1.17.0-11woody1. For the unstable distribution (sid) these problems have been fixed in version 1.17.0-18. We recommend that you upgrade your xli package. Solution: http://www.securityspace.com/smysecure/catid.html?in=DSA%20695-1 CVSS Score: 7.5 CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P |
Referencia Cruzada: |
BugTraq ID: 3006 Common Vulnerability Exposure (CVE) ID: CVE-2001-0775 http://www.securityfocus.com/bid/3006 Bugtraq: 20010710 xloadimage remote exploit - tstot.c (Google Search) http://www.securityfocus.com/archive/1/195823 Debian Security Information: DSA-069 (Google Search) http://www.debian.org/security/2001/dsa-069 Debian Security Information: DSA-695 (Google Search) http://www.debian.org/security/2005/dsa-695 http://www.gentoo.org/security/en/glsa/glsa-200503-05.xml http://www.redhat.com/support/errata/RHSA-2001-088.html SuSE Security Announcement: SA:2001:024 (Google Search) http://www.novell.com/linux/security/advisories/2001_024_xli_txt.html http://www.iss.net/security_center/static/6821.php Common Vulnerability Exposure (CVE) ID: CVE-2005-0638 BugTraq ID: 12712 http://www.securityfocus.com/bid/12712 http://www.securityfocus.com/archive/1/433935/30/5010/threaded http://security.gentoo.org/glsa/glsa-200503-05.xml http://www.osvdb.org/14365 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10898 http://www.redhat.com/support/errata/RHSA-2005-332.html http://secunia.com/advisories/14459 http://secunia.com/advisories/14462 Common Vulnerability Exposure (CVE) ID: CVE-2005-0639 |
Copyright | Copyright (c) 2005 E-Soft Inc. http://www.securityspace.com |
Esta es sólo una de 99761 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |