Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.55821
Categoría:Red Hat Local Security Checks
Título:RedHat Security Advisory RHSA-2005:835
Resumen:NOSUMMARY
Descripción:Description:

The remote host is missing updates announced in
advisory RHSA-2005:835.

The flash-plugin package contains a Mozilla-compatible Macromedia Flash
Player browser plug-in.

A buffer overflow bug was discovered in the Macromedia Flash Player. It may
be possible to execute arbitrary code on a victim's machine if the victim
opens a malicious Macromedia Flash file. The Common Vulnerabilities and
Exposures project assigned the name CVE-2005-2628 to this issue.

Users of Macromedia Flash Player should upgrade to these updated packages,
which contain version 7.0.61 and are not vulnerable to this issue.

Solution:
Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date

http://rhn.redhat.com/errata/RHSA-2005-835.html

Risk factor : High

CVSS Score:
5.1

Referencia Cruzada: BugTraq ID: 17951
BugTraq ID: 15332
Common Vulnerability Exposure (CVE) ID: CVE-2005-2628
http://lists.apple.com/archives/security-announce/2006/May/msg00003.html
http://www.securityfocus.com/bid/15332
http://www.securityfocus.com/bid/17951
Bugtraq: 20051105 [EEYEB-20050627B] Macromedia Flash Player Improper Memory Access Vulnerability (Google Search)
http://www.securityfocus.com/archive/1/415789/30/0/threaded
Cert/CC Advisory: TA06-129A
http://www.us-cert.gov/cas/techalerts/TA06-129A.html
Cert/CC Advisory: TA06-132A
http://www.us-cert.gov/cas/techalerts/TA06-132A.html
CERT/CC vulnerability note: VU#146284
http://www.kb.cert.org/vuls/id/146284
eEye Security Advisory: EEYEB-20050627B
http://www.gentoo.org/security/en/glsa/glsa-200511-21.xml
Microsoft Security Bulletin: MS06-020
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-020
http://www.osvdb.org/18825
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1557
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1987
http://www.redhat.com/support/errata/RHSA-2005-835.html
http://securitytracker.com/id?1015156
http://secunia.com/advisories/17430
http://secunia.com/advisories/17437/
http://secunia.com/advisories/17481
http://secunia.com/advisories/17626/
http://secunia.com/advisories/17738
http://secunia.com/advisories/20045
http://secunia.com/advisories/20077
SuSE Security Announcement: SUSE-SR:2005:027 (Google Search)
http://www.novell.com/linux/security/advisories/2005_27_sr.html
http://www.vupen.com/english/advisories/2005/2317
http://www.vupen.com/english/advisories/2006/1744
http://www.vupen.com/english/advisories/2006/1779
XForce ISS Database: flashplayer-swf-execute-code(22959)
https://exchange.xforce.ibmcloud.com/vulnerabilities/22959
CopyrightCopyright (c) 2005 E-Soft Inc. http://www.securityspace.com

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.