English | Deutsch | Español | Português
 ID de Usuario:
 Contraseña:
Nuevo usuario
 Acerca de:   Dedicada | Avanzada | Estándar | Periódica | Sin Riesgo | Escritorio | Básica | Individual | Sello | FAQ
  Resumen de Precio/Funciones | Ordenar  | Nuevas Vulnerabilidades | Confidencialidad | Búsqueda de Vulnerabilidad
 Búsqueda de    
Vulnerabilidad   
    Buscar 73247 Descripciones CVE y
39212 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.61612
Categoría:Ubuntu Local Security Checks
Título:Ubuntu USN-644-1 (libxml2)
Resumen:Ubuntu USN-644-1 (libxml2)
Descripción:
The remote host is missing an update to libxml2
announced via advisory USN-644-1.

A security issue affects the following Ubuntu releases:

Ubuntu 6.06 LTS
Ubuntu 7.04
Ubuntu 7.10
Ubuntu 8.04 LTS

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

Details follow:

It was discovered that libxml2 did not correctly handle long entity names.
If a user were tricked into processing a specially crafted XML document,
a remote attacker could execute arbitrary code with user privileges
or cause the application linked against libxml2 to crash, leading to a
denial of service. (CVE-2008-3529)

USN-640-1 fixed vulnerabilities in libxml2. When processing extremely
large XML documents with valid entities, it was possible to incorrectly
trigger the newly added vulnerability protections. This update fixes
the problem. (CVE-2008-3281)

Solution:
The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 6.06 LTS:
libxml2 2.6.24.dfsg-1ubuntu1.3

Ubuntu 7.04:
libxml2 2.6.27.dfsg-1ubuntu3.3

Ubuntu 7.10:
libxml2 2.6.30.dfsg-2ubuntu1.3

Ubuntu 8.04 LTS:
libxml2 2.6.31.dfsg-2ubuntu1.2

In general, a standard system upgrade is sufficient to effect the
necessary changes.

http://www.securityspace.com/smysecure/catid.html?in=USN-644-1

Risk factor : Critical
Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2008-3281
Bugtraq: 20081031 VMSA-2008-0017 Updated ESX packages for libxml2, ucd-snmp, libtiff (Google Search)
http://www.securityfocus.com/archive/1/archive/1/497962/100/0/threaded
http://mail.gnome.org/archives/xml/2008-August/msg00034.html
http://lists.vmware.com/pipermail/security-announce/2008/000039.html
http://www.vmware.com/security/advisories/VMSA-2008-0017.html
http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html
http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html
Debian Security Information: DSA-1631 (Google Search)
http://www.debian.org/security/2008/dsa-1631
https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00347.html
https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00261.html
http://security.gentoo.org/glsa/glsa-200812-06.xml
http://www.mandriva.com/security/advisories?name=MDVSA-2008:180
http://www.mandriva.com/security/advisories?name=MDVSA-2008:192
RedHat Security Advisories: RHSA-2008:0836
https://rhn.redhat.com/errata/RHSA-2008-0836.html
SuSE Security Announcement: SUSE-SR:2008:018 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00004.html
http://www.ubuntu.com/usn/usn-640-1
http://www.ubuntulinux.org/support/documentation/usn/usn-644-1
BugTraq ID: 30783
http://www.securityfocus.com/bid/30783
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6496
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9812
http://secunia.com/advisories/35379
http://www.vupen.com/english/advisories/2008/2843
http://www.vupen.com/english/advisories/2008/2971
http://www.vupen.com/english/advisories/2008/2419
http://www.securitytracker.com/id?1020728
http://secunia.com/advisories/31728
http://secunia.com/advisories/31558
http://secunia.com/advisories/31748
http://secunia.com/advisories/31590
http://secunia.com/advisories/31855
http://secunia.com/advisories/32488
http://secunia.com/advisories/31566
http://secunia.com/advisories/32807
http://secunia.com/advisories/32974
http://secunia.com/advisories/31982
http://www.vupen.com/english/advisories/2009/1522
http://www.vupen.com/english/advisories/2009/1621
Common Vulnerability Exposure (CVE) ID: CVE-2008-3529
http://www.milw0rm.com/exploits/8798
http://xmlsoft.org/news.html
http://lists.apple.com/archives/security-announce/2009/May/msg00000.html
Debian Security Information: DSA-1654 (Google Search)
http://www.debian.org/security/2008/dsa-1654
http://www.redhat.com/support/errata/RHSA-2008-0884.html
http://www.redhat.com/support/errata/RHSA-2008-0886.html
http://sunsolve.sun.com/search/document.do?assetkey=1-26-247346-1
http://sunsolve.sun.com/search/document.do?assetkey=1-66-261688-1
http://sunsolve.sun.com/search/document.do?assetkey=1-66-265329-1
http://www.ubuntu.com/usn/USN-815-1
Cert/CC Advisory: TA09-133A
http://www.us-cert.gov/cas/techalerts/TA09-133A.html
BugTraq ID: 31126
http://www.securityfocus.com/bid/31126
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11760
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6103
http://secunia.com/advisories/35056
http://secunia.com/advisories/35074
http://secunia.com/advisories/36173
http://secunia.com/advisories/36235
http://www.vupen.com/english/advisories/2008/2822
http://securitytracker.com/id?1020855
http://secunia.com/advisories/31860
http://secunia.com/advisories/31868
http://secunia.com/advisories/32280
http://secunia.com/advisories/33715
http://secunia.com/advisories/33722
http://secunia.com/advisories/32265
http://www.vupen.com/english/advisories/2009/1297
http://www.vupen.com/english/advisories/2009/1298
XForce ISS Database: libxml2-entitynames-bo(45085)
http://xforce.iss.net/xforce/xfdb/45085
CopyrightCopyright (c) 2008 E-Soft Inc. http://www.securityspace.com

Esta es sólo una de 39212 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.

Registro de Nuevo Usuario
Email:
Usuario:
Contraseña:
Envíeme por email sus boletines mensuales, informándome los últimos servicios, mejoras y encuestas.
Por favor envíeme por email un anuncio de prueba de vulnerabilidades siempre que se agregue una nueva prueba.
   Privacidad
Ingreso de Usuario Registrado
 
Usuario:   
Contraseña:  

 ¿Olvidó su usuario o contraseña??
Email/ID de Usario:




Principal | Acerca de Nosotros | Contáctenos | Programas de Asociado | Privacidad | Listas de Correo | Abuso
Auditorías de Seguridad | DNS Administrado | Monitoreo de Red | Analizador de Sitio | Informes de Investigación de Internet
Prueba de Web | Whois

© 1998-2014 E-Soft Inc. Todos los derechos reservados.