![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.55187 |
Categoría: | Slackware Local Security Checks |
Título: | Slackware: Security Advisory (SSA:2005-242-03) |
Resumen: | The remote host is missing an update for the 'gaim' package(s) announced via the SSA:2005-242-03 advisory. |
Descripción: | Summary: The remote host is missing an update for the 'gaim' package(s) announced via the SSA:2005-242-03 advisory. Vulnerability Insight: New gaim packages are available for Slackware 9.0, 9.1, 10.0, 10.1, and -current to fix some security issues. including: AIM/ICQ away message buffer overflow AIM/ICQ non-UTF-8 filename crash Gadu-Gadu memory alignment bug Sites that use GAIM should upgrade to the new version. More details about these issues may be found in the Common Vulnerabilities and Exposures (CVE) database: [links moved to references] Here are the details from the Slackware 10.1 ChangeLog: +--------------------------+ patches/packages/gaim-1.5.0-i486-1.tgz: Upgraded to gaim-1.5.0. This fixes some more security issues. For more information, see: [links moved to references] (* Security fix *) +--------------------------+ Affected Software/OS: 'gaim' package(s) on Slackware 9.0, Slackware 9.1, Slackware 10.0, Slackware 10.1, Slackware current. Solution: Please install the updated package(s). CVSS Score: 7.5 CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2005-2102 14531 http://www.securityfocus.com/bid/14531 FLSA:158543 http://www.securityfocus.com/archive/1/426078/100/0/threaded RHSA-2005:627 http://www.redhat.com/support/errata/RHSA-2005-627.html SUSE-SR:2005:019 http://www.novell.com/linux/security/advisories/2005_19_sr.html USN-168-1 https://usn.ubuntu.com/168-1/ http://gaim.sourceforge.net/security/?id=21 oval:org.mitre.oval:def:9283 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9283 Common Vulnerability Exposure (CVE) ID: CVE-2005-2103 RHSA-2005:589 http://www.redhat.com/support/errata/RHSA-2005-589.html http://gaim.sourceforge.net/security/?id=22 oval:org.mitre.oval:def:11477 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11477 Common Vulnerability Exposure (CVE) ID: CVE-2005-2370 BugTraq ID: 24600 http://www.securityfocus.com/bid/24600 Bugtraq: 20050721 Multiple vulnerabilities in libgadu and ekg package (Google Search) http://marc.info/?l=bugtraq&m=112198499417250&w=2 Debian Security Information: DSA-1318 (Google Search) http://www.debian.org/security/2007/dsa-1318 Debian Security Information: DSA-813 (Google Search) http://www.debian.org/security/2005/dsa-813 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10456 http://secunia.com/advisories/16265 |
Copyright | Copyright (C) 2012 Greenbone AG |
Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |