Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.70729
Categoría:FreeBSD Local Security Checks
Título:FreeBSD Ports: bip
Resumen:The remote host is missing an update to the system; as announced in the referenced advisory.
Descripción:Summary:
The remote host is missing an update to the system
as announced in the referenced advisory.

Vulnerability Insight:
The following package is affected: bip

CVE-2012-0806
Buffer overflow in Bip 0.8.8 and earlier might allow remote
authenticated users to execute arbitrary code via vectors involving a
series of TCP connections that triggers use of many open file
descriptors.

Solution:
Update your system with the appropriate patches or
software upgrades.

CVSS Score:
6.5

CVSS Vector:
AV:N/AC:L/Au:S/C:P/I:P/A:P

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2012-0806
47679
http://secunia.com/advisories/47679
FEDORA-2012-0916
http://lists.fedoraproject.org/pipermail/package-announce/2012-February/072767.html
FEDORA-2012-0941
http://lists.fedoraproject.org/pipermail/package-announce/2012-February/072752.html
MDVSA-2013:063
http://www.mandriva.com/security/advisories?name=MDVSA-2013:063
[oss-security] 20120124 CVE request: bip buffer overflow
http://openwall.com/lists/oss-security/2012/01/24/4
[oss-security] 20120124 Re: CVE request: bip buffer overflow
http://openwall.com/lists/oss-security/2012/01/24/10
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=657217
https://projects.duckcorp.org/issues/269
https://projects.duckcorp.org/projects/bip/repository/revisions/222a33cb84a2e52ad55a88900b7895bf9dd0262c
CopyrightCopyright (C) 2012 E-Soft Inc.

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.