![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.800325 |
Categoría: | Denial of Service |
Título: | F-PROT AV 'ELF' Header Denial of Service Vulnerability |
Resumen: | F-PROT Antivirus is prone to a denial of service vulnerability. |
Descripción: | Summary: F-PROT Antivirus is prone to a denial of service vulnerability. Vulnerability Insight: The flaw is due to error in ELF program with a corrupted header. The scanner can be exploited while scanning the header. Vulnerability Impact: Successful exploitation will allow attackers to bypass anti-virus protection and cause a Denial of Service condition. Affected Software/OS: Frisk Software, F-Prot Antivirus version 4.6.8 and prior on Linux. Solution: Upgrade to F-Prot Antivirus version 6.0.2 or later. CVSS Score: 5.0 CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2008-5747 BugTraq ID: 32753 http://www.securityfocus.com/bid/32753 Bugtraq: 20081210 [IVIZ-08-016] F-Secure f-prot Antivirus for Linux corrupted ELF header Security Bypass (Google Search) http://www.securityfocus.com/archive/1/499083 Bugtraq: 20081222 Re: [IVIZ-08-016] F-Secure f-prot Antivirus for Linux corrupted ELF header Security Bypass (Google Search) http://www.securityfocus.com/archive/1/499305/100/0/threaded http://www.securityfocus.com/archive/1/499501/100/0/threaded http://security.gentoo.org/glsa/glsa-200904-14.xml http://www.ivizsecurity.com/security-advisory-iviz-sr-08016.html http://secunia.com/advisories/34700 http://securityreason.com/securityalert/4822 |
Copyright | Copyright (C) 2009 Greenbone AG |
Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |