Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.63370
Categoría:Red Hat Local Security Checks
Título:RedHat Security Advisory RHSA-2009:0261
Resumen:The remote host is missing updates announced in;advisory RHSA-2009:0261.;;Virtual Network Computing (VNC) is a remote display system which allows you;to view a computer's desktop environment not only on the machine where it;is running, but from anywhere on the Internet and from a wide variety of;machine architectures.;;An insufficient input validation flaw was discovered in the VNC client;application, vncviewer. If an attacker could convince a victim to connect;to a malicious VNC server, or when an attacker was able to connect to;vncviewer running in the listen mode, the attacker could cause the;victim's vncviewer to crash or, possibly, execute arbitrary code.;(CVE-2008-4770);;Users of vncviewer should upgrade to these updated packages, which contain;a backported patch to resolve this issue. For the update to take effect,;all running instances of vncviewer must be restarted after the update is;installed.
Descripción:Summary:
The remote host is missing updates announced in
advisory RHSA-2009:0261.

Virtual Network Computing (VNC) is a remote display system which allows you
to view a computer's desktop environment not only on the machine where it
is running, but from anywhere on the Internet and from a wide variety of
machine architectures.

An insufficient input validation flaw was discovered in the VNC client
application, vncviewer. If an attacker could convince a victim to connect
to a malicious VNC server, or when an attacker was able to connect to
vncviewer running in the listen mode, the attacker could cause the
victim's vncviewer to crash or, possibly, execute arbitrary code.
(CVE-2008-4770)

Users of vncviewer should upgrade to these updated packages, which contain
a backported patch to resolve this issue. For the update to take effect,
all running instances of vncviewer must be restarted after the update is
installed.

Solution:
Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date

CVSS Score:
10.0

CVSS Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2008-4770
BugTraq ID: 31832
http://www.securityfocus.com/bid/31832
BugTraq ID: 33263
http://www.securityfocus.com/bid/33263
https://www.redhat.com/archives/fedora-package-announce/2009-January/msg01025.html
http://www.gentoo.org/security/en/glsa/glsa-200903-17.xml
http://www.realvnc.com/pipermail/vnc-list/2008-November/059432.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9367
http://www.redhat.com/support/errata/RHSA-2009-0261.html
http://secunia.com/advisories/32317
http://secunia.com/advisories/33689
http://secunia.com/advisories/34184
http://sunsolve.sun.com/search/document.do?assetkey=1-26-248526-1
http://www.vupen.com/english/advisories/2008/2868
XForce ISS Database: realvnc-cmsgreader-code-execution(45969)
https://exchange.xforce.ibmcloud.com/vulnerabilities/45969
XForce ISS Database: realvnc-rfb-protocol-code-execution(47937)
https://exchange.xforce.ibmcloud.com/vulnerabilities/47937
CopyrightCopyright (C) 2009 E-Soft Inc.

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.