Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.60244
Categoría:Mandrake Local Security Checks
Título:Mandrake Security Advisory MDVSA-2008:012 (python)
Resumen:NOSUMMARY
Descripción:Description:

The remote host is missing an update to python
announced via advisory MDVSA-2008:012.

An integer overflow flaw was discovered in how python's pcre module
handled certain regular expressions. If a python application using the
pcre module were to compile and execute untrusted regular expressions,
it could possibly lead to an application crash or the excution
of arbitrary code with the privileges of the python interpreter
(CVE-2006-7228).

Multiple integer overflows were found in python's imageop module.
If an application written in python used the imageop module to
process untrusted images, it could cause the application to crash,
enter an infinite loop, or possibly execute arbitrary code with the
privileges of the python interpreter (CVE-2007-4965).

The updated packages have been patched to correct these issues.

Affected: Corporate 3.0, Multi Network Firewall 2.0

Solution:
To upgrade automatically use MandrakeUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

http://www.securityspace.com/smysecure/catid.html?in=MDVSA-2008:012

Risk factor : High

CVSS Score:
6.8

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2006-7228
20080221 VMSA-2008-0003 Moderate: Updated aacraid driver and samba and python service console updates
http://www.securityfocus.com/archive/1/488457/100/0/threaded
20080416 VMSA-2008-0007 Moderate Updated Service Console packages pcre, net-snmp, and OpenPegasus
http://www.securityfocus.com/archive/1/490917/100/0/threaded
26462
http://www.securityfocus.com/bid/26462
27582
http://secunia.com/advisories/27582
27741
http://secunia.com/advisories/27741
27773
http://secunia.com/advisories/27773
27776
http://secunia.com/advisories/27776
28027
http://secunia.com/advisories/28027
28041
http://secunia.com/advisories/28041
28050
http://secunia.com/advisories/28050
28406
http://secunia.com/advisories/28406
28414
http://secunia.com/advisories/28414
28658
http://secunia.com/advisories/28658
28714
http://secunia.com/advisories/28714
28720
http://secunia.com/advisories/28720
29032
http://secunia.com/advisories/29032
29085
http://secunia.com/advisories/29085
29785
http://secunia.com/advisories/29785
30106
http://secunia.com/advisories/30106
30155
http://secunia.com/advisories/30155
30219
http://secunia.com/advisories/30219
31124
http://secunia.com/advisories/31124
ADV-2008-0637
http://www.vupen.com/english/advisories/2008/0637
ADV-2008-1234
http://www.vupen.com/english/advisories/2008/1234/references
DSA-1570
http://www.debian.org/security/2008/dsa-1570
GLSA-200711-30
http://security.gentoo.org/glsa/glsa-200711-30.xml
GLSA-200801-02
http://security.gentoo.org/glsa/glsa-200801-02.xml
GLSA-200801-18
http://security.gentoo.org/glsa/glsa-200801-18.xml
GLSA-200801-19
http://security.gentoo.org/glsa/glsa-200801-19.xml
GLSA-200802-10
http://security.gentoo.org/glsa/glsa-200802-10.xml
GLSA-200805-11
http://security.gentoo.org/glsa/glsa-200805-11.xml
MDVSA-2008:012
http://www.mandriva.com/security/advisories?name=MDVSA-2008:012
MDVSA-2008:030
http://www.mandriva.com/security/advisories?name=MDVSA-2008:030
RHSA-2007:1059
http://www.redhat.com/support/errata/RHSA-2007-1059.html
RHSA-2007:1063
http://www.redhat.com/support/errata/RHSA-2007-1063.html
RHSA-2007:1065
http://www.redhat.com/support/errata/RHSA-2007-1065.html
RHSA-2007:1068
http://www.redhat.com/support/errata/RHSA-2007-1068.html
RHSA-2007:1076
http://www.redhat.com/support/errata/RHSA-2007-1076.html
RHSA-2007:1077
http://www.redhat.com/support/errata/RHSA-2007-1077.html
RHSA-2008:0546
http://www.redhat.com/support/errata/RHSA-2008-0546.html
SUSE-SA:2007:062
http://www.novell.com/linux/security/advisories/2007_62_pcre.html
SUSE-SA:2008:004
http://lists.opensuse.org/opensuse-security-announce/2008-01/msg00006.html
[Security-announce] 20080221 VMSA-2008-0003 Moderate: Updated aacraid driver and samba and python service console updates
http://lists.vmware.com/pipermail/security-announce/2008/000005.html
[Security-announce] 20080415 VMSA-2008-0007 Moderate Updated Service Console packages pcre, net-snmp, and OpenPegasus
http://lists.vmware.com/pipermail/security-announce/2008/000014.html
http://bugs.gentoo.org/show_bug.cgi?id=198976
http://scary.beasts.org/security/CESA-2007-006.html
http://support.avaya.com/elmodocs2/security/ASA-2007-505.htm
http://www.pcre.org/changelog.txt
https://bugzilla.redhat.com/show_bug.cgi?id=383371
oval:org.mitre.oval:def:10810
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10810
Common Vulnerability Exposure (CVE) ID: CVE-2007-4965
http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html
http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html
BugTraq ID: 25696
http://www.securityfocus.com/bid/25696
Bugtraq: 20080212 FLEA-2008-0002-1 python (Google Search)
http://www.securityfocus.com/archive/1/487990/100/0/threaded
Bugtraq: 20080221 VMSA-2008-0003 Moderate: Updated aacraid driver and samba and python service console updates (Google Search)
Bugtraq: 20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components (Google Search)
http://www.securityfocus.com/archive/1/507985/100/0/threaded
Cert/CC Advisory: TA07-352A
http://www.us-cert.gov/cas/techalerts/TA07-352A.html
Debian Security Information: DSA-1551 (Google Search)
http://www.debian.org/security/2008/dsa-1551
Debian Security Information: DSA-1620 (Google Search)
http://www.debian.org/security/2008/dsa-1620
https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00378.html
http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065826.html
http://www.gentoo.org/security/en/glsa/glsa-200711-07.xml
http://www.mandriva.com/security/advisories?name=MDVSA-2008:013
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10804
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8486
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8496
http://www.redhat.com/support/errata/RHSA-2008-0629.html
http://secunia.com/advisories/26837
http://secunia.com/advisories/27460
http://secunia.com/advisories/27562
http://secunia.com/advisories/27872
http://secunia.com/advisories/28136
http://secunia.com/advisories/28480
http://secunia.com/advisories/28838
http://secunia.com/advisories/29303
http://secunia.com/advisories/29889
http://secunia.com/advisories/31255
http://secunia.com/advisories/31492
http://secunia.com/advisories/33937
http://secunia.com/advisories/37471
http://secunia.com/advisories/38675
SuSE Security Announcement: SUSE-SR:2008:003 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00003.html
http://www.ubuntu.com/usn/usn-585-1
http://www.vupen.com/english/advisories/2007/3201
http://www.vupen.com/english/advisories/2007/4238
http://www.vupen.com/english/advisories/2009/3316
XForce ISS Database: python-imageop-bo(36653)
https://exchange.xforce.ibmcloud.com/vulnerabilities/36653
CopyrightCopyright (c) 2008 E-Soft Inc. http://www.securityspace.com

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.