English | Deutsch | Español | Português
 ID de Usuario:
 Contraseña:
Nuevo usuario
 Acerca de:   Dedicada | Avanzada | Estándar | Periódica | Sin Riesgo | Escritorio | Básica | Individual | Sello | FAQ
  Resumen de Precio/Funciones | Ordenar  | Nuevas Vulnerabilidades | Confidencialidad | Búsqueda de Vulnerabilidad
 Búsqueda de    
Vulnerabilidad   
    Buscar 75096 Descripciones CVE y
39644 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.59162
Categoría:Ubuntu Local Security Checks
Título:Ubuntu USN-473-1 (libgd2)
Resumen:Ubuntu USN-473-1 (libgd2)
Descripción:
The remote host is missing an update to libgd2
announced via advisory USN-473-1.

A security issue affects the following Ubuntu releases:

Ubuntu 6.06 LTS
Ubuntu 6.10
Ubuntu 7.04

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

Details follow:

A buffer overflow was discovered in libgd2's font renderer. By tricking
an application using libgd2 into rendering a specially crafted string
with a JIS encoded font, a remote attacker could read heap memory or
crash the application, leading to a denial of service. (CVE-2007-0455)

Xavier Roche discovered that libgd2 did not correctly validate PNG
callback results. If an application were tricked into processing a
specially crafted PNG image, it would monopolize CPU resources. Since
libgd2 is often used in PHP and Perl web applications, this could lead
to a remote denial of service. (CVE-2007-2756)

Solution:
The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 6.06 LTS:
libgd2-noxpm 2.0.33-2ubuntu5.2
libgd2-xpm 2.0.33-2ubuntu5.2

Ubuntu 6.10:
libgd2-noxpm 2.0.33-4ubuntu2.1
libgd2-xpm 2.0.33-4ubuntu2.1

Ubuntu 7.04:
libgd2-noxpm 2.0.34~
rc1-2ubuntu1.1
libgd2-xpm 2.0.34~
rc1-2ubuntu1.1

After a standard system upgrade you need to reboot your computer to
effect the necessary changes.

http://www.securityspace.com/smysecure/catid.html?in=USN-473-1

Risk factor : High
Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2007-0455
Bugtraq: 20070418 rPSA-2007-0073-1 php php-mysql php-pgsql (Google Search)
http://www.securityfocus.com/archive/1/archive/1/466166/100/0/threaded
http://lists.rpath.com/pipermail/security-announce/2007-February/000145.html
http://fedoranews.org/cms/node/2631
http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052854.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052848.html
http://www.mandriva.com/security/advisories?name=MDKSA-2007:035
http://www.mandriva.com/security/advisories?name=MDKSA-2007:036
http://www.mandriva.com/security/advisories?name=MDKSA-2007:038
http://www.mandriva.com/security/advisories?name=MDKSA-2007:109
RedHat Security Advisories: RHSA-2007:0155
http://rhn.redhat.com/errata/RHSA-2007-0155.html
http://www.redhat.com/support/errata/RHSA-2007-0153.html
http://www.redhat.com/support/errata/RHSA-2007-0162.html
http://www.redhat.com/support/errata/RHSA-2008-0146.html
http://www.trustix.org/errata/2007/0007
http://www.ubuntu.com/usn/usn-473-1
BugTraq ID: 22289
http://www.securityfocus.com/bid/22289
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11303
http://secunia.com/advisories/42813
http://www.vupen.com/english/advisories/2007/0400
http://secunia.com/advisories/23916
http://secunia.com/advisories/24022
http://secunia.com/advisories/24052
http://secunia.com/advisories/24053
http://secunia.com/advisories/24107
http://secunia.com/advisories/24143
http://secunia.com/advisories/24151
http://secunia.com/advisories/24924
http://secunia.com/advisories/24965
http://secunia.com/advisories/24945
http://secunia.com/advisories/25575
http://secunia.com/advisories/29157
http://www.vupen.com/english/advisories/2011/0022
Common Vulnerability Exposure (CVE) ID: CVE-2007-2756
https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00354.html
https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00397.html
http://security.gentoo.org/glsa/glsa-200708-05.xml
http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml
http://security.gentoo.org/glsa/glsa-200711-34.xml
http://security.gentoo.org/glsa/glsa-200805-13.xml
HPdes Security Advisory: HPSBUX02262
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795
HPdes Security Advisory: SSRT071447
http://www.mandriva.com/security/advisories?name=MDKSA-2007:123
http://www.mandriva.com/security/advisories?name=MDKSA-2007:124
http://www.mandriva.com/security/advisories?name=MDKSA-2007:122
http://www.mandriva.com/security/advisories?name=MDKSA-2007:187
http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.020.html
http://www.redhat.com/support/errata/RHSA-2007-0890.html
RedHat Security Advisories: RHSA-2007:0889
http://rhn.redhat.com/errata/RHSA-2007-0889.html
http://www.redhat.com/support/errata/RHSA-2007-0891.html
http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.482863
SuSE Security Announcement: SUSE-SR:2007:013 (Google Search)
http://www.novell.com/linux/security/advisories/2007_13_sr.html
SuSE Security Announcement: SUSE-SA:2007:044 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2007-07/msg00006.html
http://www.trustix.org/errata/2007/0019/
http://www.trustix.org/errata/2007/0023/
BugTraq ID: 24089
http://www.securityfocus.com/bid/24089
http://osvdb.org/36643
http://osvdb.org/35788
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10779
http://www.vupen.com/english/advisories/2007/1905
http://www.vupen.com/english/advisories/2007/1904
http://www.vupen.com/english/advisories/2007/2016
http://www.vupen.com/english/advisories/2007/2336
http://www.vupen.com/english/advisories/2007/3386
http://www.securitytracker.com/id?1018187
http://secunia.com/advisories/25378
http://secunia.com/advisories/25362
http://secunia.com/advisories/25353
http://secunia.com/advisories/25535
http://secunia.com/advisories/25590
http://secunia.com/advisories/25646
http://secunia.com/advisories/25658
http://secunia.com/advisories/25657
http://secunia.com/advisories/25855
http://secunia.com/advisories/26048
http://secunia.com/advisories/26231
http://secunia.com/advisories/26390
http://secunia.com/advisories/26930
http://secunia.com/advisories/26871
http://secunia.com/advisories/26895
http://secunia.com/advisories/26967
http://secunia.com/advisories/27037
http://secunia.com/advisories/27110
http://secunia.com/advisories/25787
http://secunia.com/advisories/27545
http://secunia.com/advisories/27102
http://secunia.com/advisories/30168
XForce ISS Database: gd-gdpngreaddata-dos(34420)
http://xforce.iss.net/xforce/xfdb/34420
CopyrightCopyright (c) 2007 E-Soft Inc. http://www.securityspace.com

Esta es sólo una de 39644 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.

Registro de Nuevo Usuario
Email:
Usuario:
Contraseña:
Envíeme por email sus boletines mensuales, informándome los últimos servicios, mejoras y encuestas.
Por favor envíeme por email un anuncio de prueba de vulnerabilidades siempre que se agregue una nueva prueba.
   Privacidad
Ingreso de Usuario Registrado
 
Usuario:   
Contraseña:  

 ¿Olvidó su usuario o contraseña??
Email/ID de Usario:




Principal | Acerca de Nosotros | Contáctenos | Programas de Asociado | Privacidad | Listas de Correo | Abuso
Auditorías de Seguridad | DNS Administrado | Monitoreo de Red | Analizador de Sitio | Informes de Investigación de Internet
Prueba de Web | Whois

© 1998-2014 E-Soft Inc. Todos los derechos reservados.