![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.64276 |
Categoría: | Red Hat Local Security Checks |
Título: | RedHat Security Advisory RHSA-2009:1123 |
Resumen: | The remote host is missing updates announced in;advisory RHSA-2009:1123.;;GStreamer is a streaming media framework, based on graphs of filters which;operate on media data. GStreamer Good Plug-ins is a collection of;well-supported, good quality GStreamer plug-ins.;;Multiple integer overflow flaws, that could lead to a buffer overflow, were;found in the GStreamer Good Plug-ins PNG decoding handler. An attacker;could create a specially-crafted PNG file that would cause an application;using the GStreamer Good Plug-ins library to crash or, potentially, execute;arbitrary code as the user running the application when parsed.;(CVE-2009-1932);;All users of gstreamer-plugins-good are advised to upgrade to these updated;packages, which contain a backported patch to correct these issues. After;installing the update, all applications using GStreamer Good Plug-ins (such;as some media playing applications) must be restarted for the changes to;take effect. |
Descripción: | Summary: The remote host is missing updates announced in advisory RHSA-2009:1123. GStreamer is a streaming media framework, based on graphs of filters which operate on media data. GStreamer Good Plug-ins is a collection of well-supported, good quality GStreamer plug-ins. Multiple integer overflow flaws, that could lead to a buffer overflow, were found in the GStreamer Good Plug-ins PNG decoding handler. An attacker could create a specially-crafted PNG file that would cause an application using the GStreamer Good Plug-ins library to crash or, potentially, execute arbitrary code as the user running the application when parsed. (CVE-2009-1932) All users of gstreamer-plugins-good are advised to upgrade to these updated packages, which contain a backported patch to correct these issues. After installing the update, all applications using GStreamer Good Plug-ins (such as some media playing applications) must be restarted for the changes to take effect. Solution: Please note that this update is available via Red Hat Network. To use Red Hat Network, launch the Red Hat Update Agent with the following command: up2date CVSS Score: 6.8 CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2009-1932 BugTraq ID: 35172 http://www.securityfocus.com/bid/35172 Debian Security Information: DSA-1839 (Google Search) http://www.debian.org/security/2009/dsa-1839 http://security.gentoo.org/glsa/glsa-200907-11.xml http://www.mandriva.com/security/advisories?name=MDVSA-2009:130 http://osvdb.org/54827 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10798 http://www.redhat.com/support/errata/RHSA-2009-1123.html http://secunia.com/advisories/35205 http://secunia.com/advisories/35583 http://secunia.com/advisories/35777 http://secunia.com/advisories/35897 http://www.vupen.com/english/advisories/2009/1506 |
Copyright | Copyright (C) 2009 E-Soft Inc. |
Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |