Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.71983
Categoría:Slackware Local Security Checks
Título:Slackware: Security Advisory (SSA:2012-244-01)
Resumen:The remote host is missing an update for the 'glibc' package(s) announced via the SSA:2012-244-01 advisory.
Descripción:Summary:
The remote host is missing an update for the 'glibc' package(s) announced via the SSA:2012-244-01 advisory.

Vulnerability Insight:
New glibc packages are available for Slackware 13.1, 13.37, and -current to
fix security issues.


Here are the details from the Slackware 13.37 ChangeLog:
+--------------------------+
patches/packages/glibc-2.13-i486-6_slack13.37.txz: Rebuilt.
Patched multiple integer overflows in the strtod, strtof, strtold, and
strtod_l functions in stdlib in the GNU C Library allow local users to
cause a denial of service (application crash) and possibly execute
arbitrary code via a long string, which triggers a stack-based buffer
overflow.
For more information, see:
[link moved to references]
(* Security fix *)
patches/packages/glibc-i18n-2.13-i486-6_slack13.37.txz: Rebuilt.
patches/packages/glibc-profile-2.13-i486-6_slack13.37.txz: Rebuilt.
patches/packages/glibc-solibs-2.13-i486-6_slack13.37.txz: Rebuilt.
patches/packages/glibc-zoneinfo-2.13-noarch-6_slack13.37.txz: Rebuilt.
+--------------------------+

Affected Software/OS:
'glibc' package(s) on Slackware 13.1, Slackware 13.37, Slackware current.

Solution:
Please install the updated package(s).

CVSS Score:
4.6

CVSS Vector:
AV:L/AC:L/Au:N/C:P/I:P/A:P

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2012-3480
1027374
http://www.securitytracker.com/id?1027374
50201
http://secunia.com/advisories/50201
50422
http://secunia.com/advisories/50422
54982
http://www.securityfocus.com/bid/54982
84710
http://osvdb.org/84710
FEDORA-2012-11927
http://lists.fedoraproject.org/pipermail/package-announce/2012-August/085190.html
GLSA-201503-04
https://security.gentoo.org/glsa/201503-04
RHSA-2012:1207
http://rhn.redhat.com/errata/RHSA-2012-1207.html
RHSA-2012:1208
http://rhn.redhat.com/errata/RHSA-2012-1208.html
RHSA-2012:1262
http://rhn.redhat.com/errata/RHSA-2012-1262.html
RHSA-2012:1325
http://rhn.redhat.com/errata/RHSA-2012-1325.html
USN-1589-1
http://www.ubuntu.com/usn/USN-1589-1
[libc-alpha] 20120812 Fix strtod integer/buffer overflow (bug 14459)
http://sourceware.org/ml/libc-alpha/2012-08/msg00202.html
[oss-security] 20120813 CVE Request -- glibc: Integer overflows, leading to stack-based buffer overflows in strto* related routines
http://www.openwall.com/lists/oss-security/2012/08/13/4
[oss-security] 20120813 Re: CVE Request -- glibc: Integer overflows, leading to stack-based buffer overflows in strto* related routines
http://www.openwall.com/lists/oss-security/2012/08/13/6
http://sourceware.org/bugzilla/show_bug.cgi?id=14459
CopyrightCopyright (C) 2012 Greenbone AG

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.