Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.55133
Categoría:Red Hat Local Security Checks
Título:RedHat Security Advisory RHSA-2005:747
Resumen:NOSUMMARY
Descripción:Description:

The remote host is missing updates announced in
advisory RHSA-2005:747.

Slocate is a security-enhanced version of locate. Like locate, slocate
searches through a nightly-updated central database for files that match a
given pattern.

A bug was found in the way slocate processes very long paths. A local user
could create a carefully crafted directory structure that would prevent
updatedb from completing its file system scan, resulting in an incomplete
slocate database. The Common Vulnerabilities and Exposures project has
assigned the name CVE-2005-2499 to this issue.

Users are advised to upgrade to this updated package, which includes a
backported patch to resolve this issue.

Solution:
Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date

http://rhn.redhat.com/errata/RHSA-2005-747.html

Risk factor : Medium

CVSS Score:
2.1

Referencia Cruzada: BugTraq ID: 14640
Common Vulnerability Exposure (CVE) ID: CVE-2005-2499
1014751
http://securitytracker.com/id?1014751
14640
http://www.securityfocus.com/bid/14640
19034
http://www.osvdb.org/19034
RHSA-2005:345
http://www.redhat.com/support/errata/RHSA-2005-345.html
RHSA-2005:346
http://www.redhat.com/support/errata/RHSA-2005-346.html
RHSA-2005:747
http://www.redhat.com/support/errata/RHSA-2005-747.html
oval:org.mitre.oval:def:9538
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9538
slocate-directory-structure-dos(22316)
https://exchange.xforce.ibmcloud.com/vulnerabilities/22316
CopyrightCopyright (c) 2005 E-Soft Inc. http://www.securityspace.com

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.