![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.881404 |
Categoría: | CentOS Local Security Checks |
Título: | CentOS Update for evolution28-pango CESA-2011:0180 centos4 x86_64 |
Resumen: | The remote host is missing an update for the 'evolution28-pango'; package(s) announced via the referenced advisory. |
Descripción: | Summary: The remote host is missing an update for the 'evolution28-pango' package(s) announced via the referenced advisory. Vulnerability Insight: Pango is a library used for the layout and rendering of internationalized text. An input sanitization flaw, leading to a heap-based buffer overflow, was found in the way Pango displayed font files when using the FreeType font engine back end. If a user loaded a malformed font file with an application that uses Pango, it could cause the application to crash or, possibly, execute arbitrary code with the privileges of the user running the application. (CVE-2011-0020) Users of pango and evolution28-pango are advised to upgrade to these updated packages, which contain a backported patch to resolve this issue. After installing the updated packages, you must restart your system or restart your X session for the update to take effect. Affected Software/OS: evolution28-pango on CentOS 4 Solution: Please install the updated packages. CVSS Score: 7.6 CVSS Vector: AV:N/AC:H/Au:N/C:C/I:C/A:C |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2011-0020 1024994 http://www.securitytracker.com/id?1024994 42934 http://secunia.com/advisories/42934 43100 http://secunia.com/advisories/43100 45842 http://www.securityfocus.com/bid/45842 70596 http://osvdb.org/70596 ADV-2011-0186 http://www.vupen.com/english/advisories/2011/0186 ADV-2011-0238 http://www.vupen.com/english/advisories/2011/0238 RHSA-2011:0180 http://www.redhat.com/support/errata/RHSA-2011-0180.html SUSE-SR:2011:005 http://lists.opensuse.org/opensuse-security-announce/2011-04/msg00000.html [oss-security] 20110118 CVE request: heap corruption in libpango http://openwall.com/lists/oss-security/2011/01/18/6 [oss-security] 20110120 Re: CVE request: heap corruption in libpango http://openwall.com/lists/oss-security/2011/01/20/2 https://bugs.launchpad.net/ubuntu/+source/pango1.0/+bug/696616 https://bugzilla.gnome.org/show_bug.cgi?id=639882 https://bugzilla.redhat.com/show_bug.cgi?id=671122 pango-pango-bo(64832) https://exchange.xforce.ibmcloud.com/vulnerabilities/64832 |
Copyright | Copyright (C) 2012 Greenbone AG |
Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |