Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.68536
Categoría:CentOS Local Security Checks
Título:CentOS Security Advisory CESA-2010:0785 (quagga)
Resumen:NOSUMMARY
Descripción:Description:
The remote host is missing updates to quagga announced in
advisory CESA-2010:0785.

For details on the issues addressed in this update,
please visit the referenced security advisories.

Solution:
Update the appropriate packages on your system.

http://www.securityspace.com/smysecure/catid.html?in=CESA-2010:0785
http://www.securityspace.com/smysecure/catid.html?in=RHSA-2010:0785
https://rhn.redhat.com/errata/RHSA-2010-0785.html

Risk factor : High

CVSS Score:
6.5

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2007-4826
2007-0028
http://www.trustix.org/errata/2007/0028/
236141
http://sunsolve.sun.com/search/document.do?assetkey=1-26-236141-1
25634
http://www.securityfocus.com/bid/25634
26744
http://secunia.com/advisories/26744
26829
http://secunia.com/advisories/26829
26863
http://secunia.com/advisories/26863
27049
http://secunia.com/advisories/27049
29743
http://secunia.com/advisories/29743
ADV-2007-3129
http://www.vupen.com/english/advisories/2007/3129
ADV-2008-1195
http://www.vupen.com/english/advisories/2008/1195/references
DSA-1382
http://www.debian.org/security/2007/dsa-1382
FEDORA-2007-2196
http://fedoranews.org/updates/FEDORA-2007-219.shtml
MDKSA-2007:182
http://www.mandriva.com/security/advisories?name=MDKSA-2007:182
RHSA-2010:0785
http://www.redhat.com/support/errata/RHSA-2010-0785.html
USN-512-1
http://www.ubuntu.com/usn/usn-512-1
[debian-security-announce] 20071003 [SECURITY] [DSA 1379-1] New quagga packages fix denial of service
http://lists.debian.org/debian-security-announce/debian-security-announce-2007/msg00153.html
http://quagga.net/news2.php?y=2007&m=9&d=7#id1189190760
http://www.quagga.net/download/quagga-0.99.9.changelog.txt
quagga-bgpd-dos(36551)
https://exchange.xforce.ibmcloud.com/vulnerabilities/36551
Common Vulnerability Exposure (CVE) ID: CVE-2010-2948
41038
http://secunia.com/advisories/41038
41238
http://secunia.com/advisories/41238
42397
http://secunia.com/advisories/42397
42446
http://secunia.com/advisories/42446
42498
http://secunia.com/advisories/42498
42635
http://www.securityfocus.com/bid/42635
48106
http://secunia.com/advisories/48106
ADV-2010-2304
http://www.vupen.com/english/advisories/2010/2304
ADV-2010-3097
http://www.vupen.com/english/advisories/2010/3097
ADV-2010-3124
http://www.vupen.com/english/advisories/2010/3124
DSA-2104
http://www.debian.org/security/2010/dsa-2104
GLSA-201202-02
http://security.gentoo.org/glsa/glsa-201202-02.xml
MDVSA-2010:174
http://www.mandriva.com/security/advisories?name=MDVSA-2010:174
RHSA-2010:0945
http://www.redhat.com/support/errata/RHSA-2010-0945.html
SUSE-SR:2010:022
http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00006.html
SUSE-SU-2011:1316
http://lists.opensuse.org/opensuse-security-announce/2011-12/msg00009.html
USN-1027-1
http://www.ubuntu.com/usn/USN-1027-1
[oss-security] 20100824 CVE Request -- Quagga (bgpd) [two ids] -- 1, Stack buffer overflow by processing crafted Refresh-Route msgs 2, NULL ptr deref by parsing certain AS paths by BGP update request
http://www.openwall.com/lists/oss-security/2010/08/24/3
[oss-security] 20100825 Re: CVE Request -- Quagga (bgpd) [two ids] -- 1, Stack buffer overflow by processing crafted Refresh-Route msgs 2, NULL ptr deref by parsing certain AS paths by BGP update request
http://www.openwall.com/lists/oss-security/2010/08/25/4
http://code.quagga.net/?p=quagga.git%3Ba=commit%3Bh=d64379e8f3c0636df53ed08d5b2f1946cfedd0e3
http://www.quagga.net/news2.php?y=2010&m=8&d=19
https://bugzilla.redhat.com/show_bug.cgi?id=626783
CopyrightCopyright (c) 2010 E-Soft Inc. http://www.securityspace.com

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.