Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.63948
Categoría:Red Hat Local Security Checks
Título:RedHat Security Advisory RHSA-2009:0474
Resumen:The remote host is missing updates announced in;advisory RHSA-2009:0474.;;acpid is a daemon that dispatches ACPI (Advanced Configuration and Power;Interface) events to user-space programs.;;Anthony de Almeida Lopes of Outpost24 AB reported a denial of service flaw;in the acpid daemon's error handling. If an attacker could exhaust the;sockets open to acpid, the daemon would enter an infinite loop, consuming;most CPU resources and preventing acpid from communicating with legitimate;processes. (CVE-2009-0798);;Users are advised to upgrade to this updated package, which contains a;backported patch to correct this issue.
Descripción:Summary:
The remote host is missing updates announced in
advisory RHSA-2009:0474.

acpid is a daemon that dispatches ACPI (Advanced Configuration and Power
Interface) events to user-space programs.

Anthony de Almeida Lopes of Outpost24 AB reported a denial of service flaw
in the acpid daemon's error handling. If an attacker could exhaust the
sockets open to acpid, the daemon would enter an infinite loop, consuming
most CPU resources and preventing acpid from communicating with legitimate
processes. (CVE-2009-0798)

Users are advised to upgrade to this updated package, which contains a
backported patch to correct this issue.

Solution:
Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date

CVSS Score:
5.0

CVSS Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:P

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2009-0798
1022182
http://www.securitytracker.com/id?1022182
34692
http://www.securityfocus.com/bid/34692
34838
http://secunia.com/advisories/34838
34914
http://secunia.com/advisories/34914
34918
http://secunia.com/advisories/34918
35010
http://secunia.com/advisories/35010
35209
http://secunia.com/advisories/35209
35231
http://secunia.com/advisories/35231
DSA-1786
http://www.debian.org/security/2009/dsa-1786
FEDORA-2009-5578
https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01342.html
FEDORA-2009-5608
https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01365.html
GLSA-200905-06
http://www.gentoo.org/security/en/glsa/glsa-200905-06.xml
MDVSA-2009:107
http://www.mandriva.com/security/advisories?name=MDVSA-2009:107
RHSA-2009:0474
http://www.redhat.com/support/errata/RHSA-2009-0474.html
USN-766-1
http://www.ubuntu.com/usn/USN-766-1
acpid-socket-dos(50060)
https://exchange.xforce.ibmcloud.com/vulnerabilities/50060
https://bugzilla.redhat.com/show_bug.cgi?id=494443
https://bugzilla.redhat.com/show_bug.cgi?id=502583
oval:org.mitre.oval:def:7560
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7560
oval:org.mitre.oval:def:9955
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9955
CopyrightCopyright (C) 2009 E-Soft Inc.

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.