Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.69812
Categoría:Red Hat Local Security Checks
Título:RedHat Security Advisory RHSA-2011:1084
Resumen:NOSUMMARY
Descripción:Description:
The remote host is missing updates announced in
advisory RHSA-2011:1084.

The libsndfile packages provide a library for reading and writing sound
files.

An integer overflow flaw, leading to a heap-based buffer overflow, was
found in the way the libsndfile library processed certain Ensoniq PARIS
Audio Format (PAF) audio files. An attacker could create a
specially-crafted PAF file that, when opened, could cause an application
using libsndfile to crash or, potentially, execute arbitrary code with the
privileges of the user running the application. (CVE-2011-2696)

Users of libsndfile are advised to upgrade to these updated packages, which
contain a backported patch to correct this issue. All running applications
using libsndfile must be restarted for the update to take effect.

Solution:
Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date

http://rhn.redhat.com/errata/RHSA-2011-1084.html

Risk factor : High

CVSS Score:
6.8

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2011-2696
45125
http://secunia.com/advisories/45125
45351
http://secunia.com/advisories/45351
45384
http://secunia.com/advisories/45384
45388
http://secunia.com/advisories/45388
45433
http://secunia.com/advisories/45433
48644
http://www.securityfocus.com/bid/48644
DSA-2288
http://www.debian.org/security/2011/dsa-2288
FEDORA-2011-9325
http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062955.html
MDVSA-2011:119
http://www.mandriva.com/security/advisories?name=MDVSA-2011:119
RHSA-2011:1084
http://www.redhat.com/support/errata/RHSA-2011-1084.html
USN-1174-1
http://www.ubuntu.com/usn/USN-1174-1
[oss-security] 20110714 CVE Request -- libsndfile -- Integer overflow by processing certain PAF files
http://www.openwall.com/lists/oss-security/2011/07/14/1
[oss-security] 20110714 Re: CVE Request -- libsndfile -- Integer overflow by processing certain PAF files
http://www.openwall.com/lists/oss-security/2011/07/14/2
http://www.openwall.com/lists/oss-security/2011/07/14/3
[oss-security] 20110714 Re: Re: CVE Request -- libsndfile -- Integer overflow by processing certain PAF files
http://www.openwall.com/lists/oss-security/2011/07/14/4
[oss-security] 20110715 Re: CVE Request -- libsndfile -- Integer overflow by processing certain PAF files
http://www.openwall.com/lists/oss-security/2011/07/15/1
[oss-security] 20110715 Re: Re: CVE Request -- libsndfile -- Integer overflow by processing certain PAF files
http://www.openwall.com/lists/oss-security/2011/07/15/3
http://www.openwall.com/lists/oss-security/2011/07/15/4
[oss-security] 20110718 Re: CVE Request -- libsndfile -- Integer overflow by processing certain PAF files
http://www.openwall.com/lists/oss-security/2011/07/18/1
http://www.mega-nerd.com/libsndfile/ChangeLog
http://www.securelist.com/en/advisories/45125
https://bugs.gentoo.org/show_bug.cgi?id=375125
https://bugzilla.redhat.com/show_bug.cgi?id=721234
openSUSE-SU-2011:0855
https://hermes.opensuse.org/messages/10387521
CopyrightCopyright (c) 2011 E-Soft Inc. http://www.securityspace.com

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.