![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.870738 |
Categoría: | Red Hat Local Security Checks |
Título: | RedHat Update for python-sqlalchemy RHSA-2012:0369-01 |
Resumen: | The remote host is missing an update for the 'python-sqlalchemy'; package(s) announced via the referenced advisory. |
Descripción: | Summary: The remote host is missing an update for the 'python-sqlalchemy' package(s) announced via the referenced advisory. Vulnerability Insight: SQLAlchemy is an Object Relational Mapper (ORM) that provides a flexible, high-level interface to SQL databases. It was discovered that SQLAlchemy did not sanitize values for the limit and offset keywords for SQL select statements. If an application using SQLAlchemy accepted values for these keywords, and did not filter or sanitize them before passing them to SQLAlchemy, it could allow an attacker to perform an SQL injection attack against the application. (CVE-2012-0805) All users of python-sqlalchemy are advised to upgrade to this updated package, which contains a patch to correct this issue. All running applications using SQLAlchemy must be restarted for this update to take effect. Affected Software/OS: python-sqlalchemy on Red Hat Enterprise Linux Server (v. 6), Red Hat Enterprise Linux Workstation (v. 6) Solution: Please Install the Updated Packages. CVSS Score: 7.5 CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2012-0805 48327 http://secunia.com/advisories/48327 48328 http://secunia.com/advisories/48328 48771 http://secunia.com/advisories/48771 DSA-2449 http://www.debian.org/security/2012/dsa-2449 MDVSA-2012:059 http://www.mandriva.com/security/advisories?name=MDVSA-2012:059 RHSA-2012:0369 http://rhn.redhat.com/errata/RHSA-2012-0369.html http://www.sqlalchemy.org/changelog/CHANGES_0_7_0 http://www.sqlalchemy.org/trac/changeset/852b6a1a87e7/ https://bugs.launchpad.net/keystone/+bug/918608 sqlalchemy-select-sql-injection(73756) https://exchange.xforce.ibmcloud.com/vulnerabilities/73756 |
Copyright | Copyright (C) 2012 Greenbone AG |
Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |