Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.67898
Categoría:Red Hat Local Security Checks
Título:RedHat Security Advisory RHSA-2010:0651
Resumen:NOSUMMARY
Descripción:Description:
The remote host is missing updates announced in
advisory RHSA-2010:0651.

The Simple Protocol for Independent Computing Environments (SPICE) is a
remote display protocol used in Red Hat Enterprise Linux for viewing
virtualized guests running on the Kernel-based Virtual Machine (KVM)
hypervisor, or on Red Hat Enterprise Virtualization Hypervisor.

The spice-xpi package provides a plug-in that allows the SPICE client to
run from within Mozilla Firefox.

A race condition was found in the way the SPICE Firefox plug-in and the
SPICE client communicated. A local attacker could use this flaw to trick
the plug-in and the SPICE client into communicating over an
attacker-controlled socket, possibly gaining access to authentication
details, or resulting in a man-in-the-middle attack on the SPICE
connection. (CVE-2010-2792)

It was found that the SPICE Firefox plug-in used a predictable name for its
log file. A local attacker could use this flaw to conduct a symbolic link
attack, allowing them to overwrite arbitrary files accessible to the user
running Firefox. (CVE-2010-2794)

Solution:
Users of spice-xpi should upgrade to this updated package, which contains
backported patches to correct these issues. After installing the update,
Firefox must be restarted for the changes to take effect.

Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date

http://rhn.redhat.com/errata/RHSA-2010-0651.html
http://www.redhat.com/security/updates/classification/#moderate

Risk factor : Medium

CVSS Score:
3.3

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2010-2792
41120
http://secunia.com/advisories/41120
42711
http://www.securityfocus.com/bid/42711
67619
http://osvdb.org/67619
ADV-2010-2181
http://www.vupen.com/english/advisories/2010/2181
RHSA-2010:0632
http://www.redhat.com/support/errata/RHSA-2010-0632.html
RHSA-2010:0651
http://www.redhat.com/support/errata/RHSA-2010-0651.html
https://bugzilla.redhat.com/show_bug.cgi?id=620350
Common Vulnerability Exposure (CVE) ID: CVE-2010-2794
67620
http://osvdb.org/67620
https://bugzilla.redhat.com/show_bug.cgi?id=620356
CopyrightCopyright (c) 2010 E-Soft Inc. http://www.securityspace.com

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.