Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.58160
Categoría:Gentoo Local Security Checks
Título:Gentoo Security Advisory GLSA 200703-22 (nss)
Resumen:The remote host is missing updates announced in;advisory GLSA 200703-22.
Descripción:Summary:
The remote host is missing updates announced in
advisory GLSA 200703-22.

Vulnerability Insight:
The Mozilla Network Security Services libraries are vulnerable to two
buffer overflows that could result in the remote execution of arbitrary
code.

Solution:
All NSS users should upgrade to the latest version:

# emerge --sync
# emerge --ask --oneshot --verbose '>=dev-libs/nss-3.11.5'

CVSS Score:
6.8

CVSS Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2007-0008
1017696
http://www.securitytracker.com/id?1017696
102856
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102856-1
102945
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102945-1
20070202-01-P
ftp://patches.sgi.com/support/free/security/advisories/20070202-01-P.asc
20070223 Mozilla Network Security Services SSLv2 Client Integer Underflow Vulnerability
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=482
20070226 rPSA-2007-0040-1 firefox
http://www.securityfocus.com/archive/1/461336/100/0/threaded
20070301-01-P
ftp://patches.sgi.com/support/free/security/advisories/20070301-01-P.asc
20070303 rPSA-2007-0040-3 firefox thunderbird
http://www.securityfocus.com/archive/1/461809/100/0/threaded
22694
http://www.securityfocus.com/bid/22694
24205
http://secunia.com/advisories/24205
24238
http://secunia.com/advisories/24238
24252
http://secunia.com/advisories/24252
24253
http://secunia.com/advisories/24253
24277
http://secunia.com/advisories/24277
24287
http://secunia.com/advisories/24287
24290
http://secunia.com/advisories/24290
24293
http://secunia.com/advisories/24293
24320
http://secunia.com/advisories/24320
24328
http://secunia.com/advisories/24328
24333
http://secunia.com/advisories/24333
24342
http://secunia.com/advisories/24342
24343
http://secunia.com/advisories/24343
24384
http://secunia.com/advisories/24384
24389
http://secunia.com/advisories/24389
24395
http://secunia.com/advisories/24395
24406
http://secunia.com/advisories/24406
24410
http://secunia.com/advisories/24410
24455
http://secunia.com/advisories/24455
24456
http://secunia.com/advisories/24456
24457
http://secunia.com/advisories/24457
24522
http://secunia.com/advisories/24522
24562
http://secunia.com/advisories/24562
24650
http://secunia.com/advisories/24650
24703
http://secunia.com/advisories/24703
25588
http://secunia.com/advisories/25588
25597
http://secunia.com/advisories/25597
32105
http://www.osvdb.org/32105
64758
http://www.securityfocus.com/bid/64758
ADV-2007-0718
http://www.vupen.com/english/advisories/2007/0718
ADV-2007-0719
http://www.vupen.com/english/advisories/2007/0719
ADV-2007-1165
http://www.vupen.com/english/advisories/2007/1165
ADV-2007-2141
http://www.vupen.com/english/advisories/2007/2141
DSA-1336
http://www.debian.org/security/2007/dsa-1336
FEDORA-2007-278
http://fedoranews.org/cms/node/2709
FEDORA-2007-279
http://fedoranews.org/cms/node/2711
FEDORA-2007-281
http://fedoranews.org/cms/node/2713
FEDORA-2007-293
http://fedoranews.org/cms/node/2728
FEDORA-2007-308
http://fedoranews.org/cms/node/2747
FEDORA-2007-309
http://fedoranews.org/cms/node/2749
GLSA-200703-18
http://security.gentoo.org/glsa/glsa-200703-18.xml
GLSA-200703-22
http://www.gentoo.org/security/en/glsa/glsa-200703-22.xml
HPSBUX02153
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742
MDKSA-2007:050
http://www.mandriva.com/security/advisories?name=MDKSA-2007:050
MDKSA-2007:052
http://www.mandriva.com/security/advisories?name=MDKSA-2007:052
RHSA-2007:0077
http://rhn.redhat.com/errata/RHSA-2007-0077.html
RHSA-2007:0078
http://www.redhat.com/support/errata/RHSA-2007-0078.html
RHSA-2007:0079
http://www.redhat.com/support/errata/RHSA-2007-0079.html
RHSA-2007:0097
http://www.redhat.com/support/errata/RHSA-2007-0097.html
RHSA-2007:0108
http://www.redhat.com/support/errata/RHSA-2007-0108.html
SSA:2007-066-03
http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.374851
SSA:2007-066-04
http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.363947
SSA:2007-066-05
http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.338131
SSRT061181
SUSE-SA:2007:019
http://lists.suse.com/archive/suse-security-announce/2007-Mar/0001.html
SUSE-SA:2007:022
http://www.novell.com/linux/security/advisories/2007_22_mozilla.html
USN-428-1
http://www.ubuntu.com/usn/usn-428-1
USN-431-1
http://www.ubuntu.com/usn/usn-431-1
VU#377812
http://www.kb.cert.org/vuls/id/377812
http://www.mozilla.org/security/announce/2007/mfsa2007-06.html
http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html
https://bugzilla.mozilla.org/show_bug.cgi?id=364319
https://issues.rpath.com/browse/RPL-1081
https://issues.rpath.com/browse/RPL-1103
nss-mastersecret-bo(32666)
https://exchange.xforce.ibmcloud.com/vulnerabilities/32666
oval:org.mitre.oval:def:10502
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10502
Common Vulnerability Exposure (CVE) ID: CVE-2007-0009
20070223 Mozilla Network Security Services SSLv2 Server Stack Overflow Vulnerability
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=483
32106
http://www.osvdb.org/32106
VU#592796
http://www.kb.cert.org/vuls/id/592796
https://bugzilla.mozilla.org/show_bug.cgi?id=364323
nss-clientmasterkey-bo(32663)
https://exchange.xforce.ibmcloud.com/vulnerabilities/32663
oval:org.mitre.oval:def:10174
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10174
CopyrightCopyright (C) 2008 E-Soft Inc.

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.