Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.871862
Categoría:Red Hat Local Security Checks
Título:RedHat Update for glibc RHSA-2017:1916-01
Resumen:The remote host is missing an update for the 'glibc'; package(s) announced via the referenced advisory.
Descripción:Summary:
The remote host is missing an update for the 'glibc'
package(s) announced via the referenced advisory.

Vulnerability Insight:
The glibc packages provide the standard C
libraries (libc), POSIX thread libraries (libpthread), standard math libraries
(libm), and the name service cache daemon (nscd) used by multiple programs on
the system. Without these libraries, the Linux system cannot function correctly.
Security Fix(es): * A stack overflow vulnerability was found in nan* functions
that could cause applications, which process long strings with the nan function,
to crash or, potentially, execute arbitrary code. (CVE-2014-9761) * It was found
that out-of-range time values passed to the strftime() function could result in
an out-of-bounds memory access. This could lead to application crash or,
potentially, information disclosure. (CVE-2015-8776) * An integer overflow
vulnerability was found in hcreate() and hcreate_r() functions which could
result in an out-of-bounds memory access. This could lead to application crash
or, potentially, arbitrary code execution. (CVE-2015-8778) * A stack based
buffer overflow vulnerability was found in the catopen() function. An
excessively long string passed to the function could cause it to crash or,
potentially, execute arbitrary code. (CVE-2015-8779) * It was found that the
dynamic loader did not sanitize the LD_POINTER_GUARD environment variable. An
attacker could use this flaw to bypass the pointer guarding protection on
set-user-ID or set-group-ID programs to execute arbitrary code with the
permissions of the user running the application. (CVE-2015-8777) Additional
Changes: For detailed information on changes in this release, see the Red Hat
Enterprise Linux 7.4 Release Notes linked from the References section.

Affected Software/OS:
glibc on Red Hat Enterprise Linux Server (v. 7)

Solution:
Please Install the Updated Packages.

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2014-9761
BugTraq ID: 83306
http://www.securityfocus.com/bid/83306
Bugtraq: 20190613 SEC Consult SA-20190612-0 :: Multiple vulnerabilities in WAGO 852 Industrial Managed Switch Series (Google Search)
https://seclists.org/bugtraq/2019/Jun/14
Bugtraq: 20190904 SEC Consult SA-20190904-0 :: Multiple vulnerabilities in Cisco router series RV34X, RV26X and RV16X (Google Search)
https://seclists.org/bugtraq/2019/Sep/7
http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184626.html
http://seclists.org/fulldisclosure/2019/Jun/18
http://seclists.org/fulldisclosure/2019/Sep/7
https://security.gentoo.org/glsa/201702-11
http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html
http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html
https://www.sourceware.org/ml/libc-alpha/2016-02/msg00502.html
http://www.openwall.com/lists/oss-security/2016/01/19/11
http://www.openwall.com/lists/oss-security/2016/01/20/1
RedHat Security Advisories: RHSA-2017:0680
http://rhn.redhat.com/errata/RHSA-2017-0680.html
RedHat Security Advisories: RHSA-2017:1916
https://access.redhat.com/errata/RHSA-2017:1916
SuSE Security Announcement: SUSE-SU-2016:0470 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html
SuSE Security Announcement: SUSE-SU-2016:0471 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00037.html
SuSE Security Announcement: SUSE-SU-2016:0472 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00038.html
SuSE Security Announcement: SUSE-SU-2016:0473 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00039.html
SuSE Security Announcement: openSUSE-SU-2016:0510 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00042.html
http://www.ubuntu.com/usn/USN-2985-1
http://www.ubuntu.com/usn/USN-2985-2
Common Vulnerability Exposure (CVE) ID: CVE-2015-8776
BugTraq ID: 83277
http://www.securityfocus.com/bid/83277
Debian Security Information: DSA-3480 (Google Search)
http://www.debian.org/security/2016/dsa-3480
Debian Security Information: DSA-3481 (Google Search)
http://www.debian.org/security/2016/dsa-3481
https://security.gentoo.org/glsa/201602-02
Common Vulnerability Exposure (CVE) ID: CVE-2015-8777
1034811
http://www.securitytracker.com/id/1034811
81469
http://www.securityfocus.com/bid/81469
DSA-3480
FEDORA-2016-0480defc94
http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177404.html
GLSA-201702-11
RHSA-2017:1916
SUSE-SU-2016:0470
SUSE-SU-2016:0471
SUSE-SU-2016:0472
SUSE-SU-2016:0473
USN-2985-1
USN-2985-2
[oss-security] 20160119 Re: CVE assignment request for security bugs fixed in glibc 2.23
http://hmarco.org/bugs/glibc_ptr_mangle_weakness.html
https://sourceware.org/bugzilla/show_bug.cgi?id=18928
Common Vulnerability Exposure (CVE) ID: CVE-2015-8778
BugTraq ID: 83275
http://www.securityfocus.com/bid/83275
Common Vulnerability Exposure (CVE) ID: CVE-2015-8779
BugTraq ID: 82244
http://www.securityfocus.com/bid/82244
CopyrightCopyright (C) 2017 Greenbone AG

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.