![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.63435 |
Categoría: | Red Hat Local Security Checks |
Título: | RedHat Security Advisory RHSA-2009:0334 |
Resumen: | The remote host is missing updates announced in;advisory RHSA-2009:0334.;;The flash-plugin package contains a Firefox-compatible Adobe Flash Player;Web browser plug-in.;;Multiple input validation flaws were found in the way Flash Player;displayed certain SWF (Shockwave Flash) content. An attacker could use;these flaws to create a specially-crafted SWF file that could cause;flash-plugin to crash, or, possibly, execute arbitrary code when the victim;loaded a page containing the specially-crafted SWF content. (CVE-2009-0520,;CVE-2009-0519);;All users of Adobe Flash Player should install this updated package, which;upgrades Flash Player to version 9.0.159.0. |
Descripción: | Summary: The remote host is missing updates announced in advisory RHSA-2009:0334. The flash-plugin package contains a Firefox-compatible Adobe Flash Player Web browser plug-in. Multiple input validation flaws were found in the way Flash Player displayed certain SWF (Shockwave Flash) content. An attacker could use these flaws to create a specially-crafted SWF file that could cause flash-plugin to crash, or, possibly, execute arbitrary code when the victim loaded a page containing the specially-crafted SWF content. (CVE-2009-0520, CVE-2009-0519) All users of Adobe Flash Player should install this updated package, which upgrades Flash Player to version 9.0.159.0. Solution: Please note that this update is available via Red Hat Network. To use Red Hat Network, launch the Red Hat Update Agent with the following command: up2date CVSS Score: 9.3 CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2009-0519 http://lists.apple.com/archives/security-announce/2009/May/msg00002.html BugTraq ID: 33890 http://www.securityfocus.com/bid/33890 Cert/CC Advisory: TA09-133A http://www.us-cert.gov/cas/techalerts/TA09-133A.html http://security.gentoo.org/glsa/glsa-200903-23.xml http://isc.sans.org/diary.html?storyid=5929 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15837 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6470 RedHat Security Advisories: RHSA-2009:0332 http://rhn.redhat.com/errata/RHSA-2009-0332.html RedHat Security Advisories: RHSA-2009:0334 http://rhn.redhat.com/errata/RHSA-2009-0334.html http://secunia.com/advisories/34012 http://secunia.com/advisories/34226 http://secunia.com/advisories/34293 http://secunia.com/advisories/35074 http://sunsolve.sun.com/search/document.do?assetkey=1-66-254909-1 http://www.vupen.com/english/advisories/2009/0513 http://www.vupen.com/english/advisories/2009/0743 http://www.vupen.com/english/advisories/2009/1297 XForce ISS Database: flash-swf-unspecified-dos(48900) https://exchange.xforce.ibmcloud.com/vulnerabilities/48900 Common Vulnerability Exposure (CVE) ID: CVE-2009-0520 BugTraq ID: 33880 http://www.securityfocus.com/bid/33880 http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=773 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16057 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6593 http://securitytracker.com/id?1021750 XForce ISS Database: flash-invalid-object-bo(48887) https://exchange.xforce.ibmcloud.com/vulnerabilities/48887 |
Copyright | Copyright (C) 2009 E-Soft Inc. |
Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |