Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.57942
Categoría:Gentoo Local Security Checks
Título:Gentoo Security Advisory GLSA 200612-03 (gnupg)
Resumen:The remote host is missing updates announced in;advisory GLSA 200612-03.
Descripción:Summary:
The remote host is missing updates announced in
advisory GLSA 200612-03.

Vulnerability Insight:
GnuPG is vulnerable to a buffer overflow and an erroneous function pointer
dereference that can result in the execution of arbitrary code.

Solution:
All GnuPG users should upgrade to the latest version:

# emerge --sync
# emerge --ask --oneshot --verbose '=app-crypt/gnupg-1.4*'

CVSS Score:
10.0

CVSS Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2006-6169
BugTraq ID: 21306
http://www.securityfocus.com/bid/21306
Bugtraq: 20061127 GnuPG 1.4 and 2.0 buffer overflow (Google Search)
http://www.securityfocus.com/archive/1/452829/100/0/threaded
Bugtraq: 20061201 rPSA-2006-0224-1 gnupg (Google Search)
http://www.securityfocus.com/archive/1/453253/100/100/threaded
Debian Security Information: DSA-1231 (Google Search)
http://www.debian.org/security/2006/dsa-1231
http://security.gentoo.org/glsa/glsa-200612-03.xml
http://www.mandriva.com/security/advisories?name=MDKSA-2006:221
https://bugs.g10code.com/gnupg/issue728
http://lists.gnupg.org/pipermail/gnupg-announce/2006q4/000241.html
http://www.openpkg.com/security/advisories/OpenPKG-SA-2006.037.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11228
http://www.redhat.com/support/errata/RHSA-2006-0754.html
http://securitytracker.com/id?1017291
http://secunia.com/advisories/23094
http://secunia.com/advisories/23110
http://secunia.com/advisories/23146
http://secunia.com/advisories/23161
http://secunia.com/advisories/23171
http://secunia.com/advisories/23250
http://secunia.com/advisories/23269
http://secunia.com/advisories/23284
http://secunia.com/advisories/23299
http://secunia.com/advisories/23303
http://secunia.com/advisories/23513
http://secunia.com/advisories/24047
SGI Security Advisory: 20061201-01-P
ftp://patches.sgi.com/support/free/security/advisories/20061201-01-P.asc
http://securityreason.com/securityalert/1927
SuSE Security Announcement: SUSE-SA:2006:075 (Google Search)
http://lists.suse.com/archive/suse-security-announce/2006-Dec/0004.html
http://www.trustix.org/errata/2006/0068/
http://www.ubuntu.com/usn/usn-389-1
http://www.ubuntu.com/usn/usn-393-2
http://www.vupen.com/english/advisories/2006/4736
XForce ISS Database: gnupg-openfile-bo(30550)
https://exchange.xforce.ibmcloud.com/vulnerabilities/30550
Common Vulnerability Exposure (CVE) ID: CVE-2006-6235
BugTraq ID: 21462
http://www.securityfocus.com/bid/21462
Bugtraq: 20061206 GnuPG: remotely controllable function pointer [CVE-2006-6235] (Google Search)
http://www.securityfocus.com/archive/1/453664/100/0/threaded
Bugtraq: 20061206 rPSA-2006-0227-1 gnupg (Google Search)
http://www.securityfocus.com/archive/1/453723/100/0/threaded
CERT/CC vulnerability note: VU#427009
http://www.kb.cert.org/vuls/id/427009
http://www.mandriva.com/security/advisories?name=MDKSA-2006:228
http://lists.gnupg.org/pipermail/gnupg-announce/2006q4/000491.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11245
http://securitytracker.com/id?1017349
http://secunia.com/advisories/23245
http://secunia.com/advisories/23255
http://secunia.com/advisories/23259
http://secunia.com/advisories/23290
http://secunia.com/advisories/23329
http://secunia.com/advisories/23335
SuSE Security Announcement: SUSE-SR:2006:028 (Google Search)
http://www.novell.com/linux/security/advisories/2006_28_sr.html
http://www.trustix.org/errata/2006/0070
http://www.ubuntu.com/usn/usn-393-1
http://www.vupen.com/english/advisories/2006/4881
XForce ISS Database: gnupg-openpgp-code-execution(30711)
https://exchange.xforce.ibmcloud.com/vulnerabilities/30711
CopyrightCopyright (C) 2008 E-Soft Inc.

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.