![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.881415 |
Categoría: | CentOS Local Security Checks |
Título: | CentOS Update for xmlsec1 CESA-2011:0486 centos4 x86_64 |
Resumen: | The remote host is missing an update for the 'xmlsec1'; package(s) announced via the referenced advisory. |
Descripción: | Summary: The remote host is missing an update for the 'xmlsec1' package(s) announced via the referenced advisory. Vulnerability Insight: The XML Security Library is a C library based on libxml2 and OpenSSL that implements the XML Digital Signature and XML Encryption standards. A flaw was found in the way xmlsec1 handled XML files that contain an XSLT transformation specification. A specially-crafted XML file could cause xmlsec1 to create or overwrite an arbitrary file while performing the verification of a file's digital signature. (CVE-2011-1425) Red Hat would like to thank Nicolas Grgoire and Aleksey Sanin for reporting this issue. This update also fixes the following bug: * xmlsec1 previously used an incorrect search path when searching for crypto plug-in libraries, possibly trying to access such libraries using a relative path. (BZ#558480, BZ#700467) Users of xmlsec1 should upgrade to these updated packages, which contain backported patches to correct these issues. After installing the update, all running applications that use the xmlsec1 library must be restarted for the update to take effect. Affected Software/OS: xmlsec1 on CentOS 4 Solution: Please install the updated packages. CVSS Score: 5.1 CVSS Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2011-1425 BugTraq ID: 47135 http://www.securityfocus.com/bid/47135 Debian Security Information: DSA-2219 (Google Search) http://www.debian.org/security/2011/dsa-2219 http://www.mandriva.com/security/advisories?name=MDVSA-2011:063 http://www.aleksey.com/pipermail/xmlsec/2011/009120.html http://www.redhat.com/support/errata/RHSA-2011-0486.html http://www.securitytracker.com/id?1025284 http://secunia.com/advisories/43920 http://secunia.com/advisories/44167 http://secunia.com/advisories/44423 http://www.vupen.com/english/advisories/2011/0855 http://www.vupen.com/english/advisories/2011/0858 http://www.vupen.com/english/advisories/2011/1010 http://www.vupen.com/english/advisories/2011/1172 XForce ISS Database: xmlsecurity-xmlfiles-sec-bypass(66506) https://exchange.xforce.ibmcloud.com/vulnerabilities/66506 |
Copyright | Copyright (C) 2012 Greenbone AG |
Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |