Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.1.10.2013.0332
Categoría:Mageia Linux Local Security Checks
Título:Mageia: Security Advisory (MGASA-2013-0332)
Resumen:The remote host is missing an update for the 'poppler' package(s) announced via the MGASA-2013-0332 advisory.
Descripción:Summary:
The remote host is missing an update for the 'poppler' package(s) announced via the MGASA-2013-0332 advisory.

Vulnerability Insight:
Updated poppler packages fix security vulnerabilities:

Poppler is found to be affected by a stack based buffer overflow vulnerability
in the pdfseparate utility. Successfully exploiting this issue could allow
remote attackers to execute arbitrary code in the context of the affected
application. Failed exploits may result in denial-of-service conditions
(CVE-2013-4473).

Poppler was found to have a user controlled format string vulnerability because
it fails to sanitize user-supplied input. An attacker may exploit this issue to
execute arbitrary code in the context of the vulnerable application. Failed
exploit attempts will likely result in a denial-of-service condition
(CVE-2013-4474).

Affected Software/OS:
'poppler' package(s) on Mageia 2, Mageia 3.

Solution:
Please install the updated package(s).

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2013-4473
BugTraq ID: 63368
http://www.securityfocus.com/bid/63368
http://security.gentoo.org/glsa/glsa-201401-21.xml
http://www.openwall.com/lists/oss-security/2013/10/29/1
http://secunia.com/advisories/56567
http://www.ubuntu.com/usn/USN-2958-1
Common Vulnerability Exposure (CVE) ID: CVE-2013-4474
BugTraq ID: 63374
http://www.securityfocus.com/bid/63374
CopyrightCopyright (C) 2022 Greenbone AG

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.