![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.800600 |
Categoría: | Denial of Service |
Título: | PGP Desktop Local Denial of Service Vulnerability |
Resumen: | PGP Desktop is prone to a denial of service (DoS); vulnerability. |
Descripción: | Summary: PGP Desktop is prone to a denial of service (DoS) vulnerability. Vulnerability Insight: IOCTL handler in 'pgpdisk.sys' and 'pgpwded.sys' files does not adequately validate buffer data associated with the Irp object. Vulnerability Impact: Successful exploitation allows attackers to execute arbitrary code with system privileges or to crash the application. Affected Software/OS: PGP Desktop prior to version 9.10 on Windows. Solution: Upgrade to PGP Desktop 9.10. CVSS Score: 7.2 CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2009-0681 Bugtraq: 20090413 [Suspected Spam][Positive Technologies SA 2009-01] PGP Desktop Pgpdisk.sys And Pgpwded.sys Multiple Vulnerabilities (Google Search) http://www.securityfocus.com/archive/1/502633/100/0/threaded http://en.securitylab.ru/lab/PT-2009-01 https://pgp.custhelp.com/cgi-bin/pgp.cfg/php/enduser/std_adp.php?p_faqid=1014&p_topview=1 http://www.securitytracker.com/id?1022034 |
Copyright | Copyright (C) 2009 Greenbone AG |
Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |