Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.58065
Categoría:Gentoo Local Security Checks
Título:Gentoo Security Advisory GLSA 200703-06 (emul-linux-x86-qtlibs)
Resumen:The remote host is missing updates announced in;advisory GLSA 200703-06.
Descripción:Summary:
The remote host is missing updates announced in
advisory GLSA 200703-06.

Vulnerability Insight:
The AMD64 x86 emulation Qt library makes use of an insecure version of the
Qt library, potentially allowing for the remote execution of arbitrary
code.

Solution:
All AMD64 x86 emulation Qt library users should upgrade to the latest
version:

# emerge --sync
# emerge --ask --oneshot --verbose '>=app-emulation/emul-linux-x86-qtlibs-10.0'

CVSS Score:
6.8

CVSS Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2006-4811
1017084
http://securitytracker.com/id?1017084
20061002-01-P
ftp://patches.sgi.com/support/free/security/advisories/20061002-01-P
20061018 rPSA-2006-0195-1 kdelibs
http://www.securityfocus.com/archive/1/449173/100/0/threaded
20061101-01-P
ftp://patches.sgi.com/support/free/security/advisories/20061101-01-P
20599
http://www.securityfocus.com/bid/20599
22380
http://secunia.com/advisories/22380
22397
http://secunia.com/advisories/22397
22479
http://secunia.com/advisories/22479
22485
http://secunia.com/advisories/22485
22492
http://secunia.com/advisories/22492
22520
http://secunia.com/advisories/22520
22579
http://secunia.com/advisories/22579
22586
http://secunia.com/advisories/22586
22589
http://secunia.com/advisories/22589
22645
http://secunia.com/advisories/22645
22738
http://secunia.com/advisories/22738
22890
http://secunia.com/advisories/22890
22929
http://secunia.com/advisories/22929
24347
http://secunia.com/advisories/24347
ADV-2006-4099
http://www.vupen.com/english/advisories/2006/4099
DSA-1200
http://www.us.debian.org/security/2006/dsa-1200
GLSA-200611-02
http://security.gentoo.org/glsa/glsa-200611-02.xml
GLSA-200703-06
http://security.gentoo.org/glsa/glsa-200703-06.xml
MDKSA-2006:186
http://www.mandriva.com/security/advisories?name=MDKSA-2006:186
MDKSA-2006:187
http://www.mandriva.com/security/advisories?name=MDKSA-2006:187
RHSA-2006:0720
http://www.redhat.com/support/errata/RHSA-2006-0720.html
RHSA-2006:0725
http://www.redhat.com/support/errata/RHSA-2006-0725.html
SSA:2006-298-01
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.483634
SUSE-SA:2006:063
http://lists.suse.com/archive/suse-security-announce/2006-Oct/0006.html
USN-368-1
http://www.ubuntu.com/usn/usn-368-1
http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=210742
http://www.trolltech.com/company/newsroom/announcements/press.2006-10-19.5434451733
https://issues.rpath.com/browse/RPL-723
oval:org.mitre.oval:def:10218
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10218
CopyrightCopyright (C) 2008 E-Soft Inc.

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.