Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.1.10.2014.0154
Categoría:Mageia Linux Local Security Checks
Título:Mageia: Security Advisory (MGASA-2014-0154)
Resumen:The remote host is missing an update for the 'perl-YAML-LibYAML' package(s) announced via the MGASA-2014-0154 advisory.
Descripción:Summary:
The remote host is missing an update for the 'perl-YAML-LibYAML' package(s) announced via the MGASA-2014-0154 advisory.

Vulnerability Insight:
Updated perl-YAML-LibYAML packages fix security vulnerabilities:

Florian Weimer of the Red Hat Product Security Team discovered a heap-based
buffer overflow flaw in LibYAML, a fast YAML 1.1 parser and emitter library.
A remote attacker could provide a YAML document with a specially-crafted tag
that, when parsed by an application using libyaml, would cause the application
to crash or, potentially, execute arbitrary code with the privileges of the
user running the application (CVE-2013-6393).

Ivan Fratric of the Google Security Team discovered a heap-based buffer
overflow vulnerability in LibYAML, a fast YAML 1.1 parser and emitter
library. A remote attacker could provide a specially-crafted YAML document
that, when parsed by an application using libyaml, would cause the application
to crash or, potentially, execute arbitrary code with the privileges of the
user running the application (CVE-2014-2525).

The perl-YAML-LibYAML package is being updated as it contains an embedded copy
of LibYAML.

Affected Software/OS:
'perl-YAML-LibYAML' package(s) on Mageia 3, Mageia 4.

Solution:
Please install the updated package(s).

CVSS Score:
6.8

CVSS Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2013-6393
http://archives.neohapsis.com/archives/bugtraq/2014-04/0134.html
http://archives.neohapsis.com/archives/bugtraq/2014-10/0103.html
BugTraq ID: 65258
http://www.securityfocus.com/bid/65258
Debian Security Information: DSA-2850 (Google Search)
http://www.debian.org/security/2014/dsa-2850
Debian Security Information: DSA-2870 (Google Search)
http://www.debian.org/security/2014/dsa-2870
http://www.mandriva.com/security/advisories?name=MDVSA-2015:060
https://bugzilla.redhat.com/attachment.cgi?id=847926&action=diff
http://osvdb.org/102716
RedHat Security Advisories: RHSA-2014:0353
http://rhn.redhat.com/errata/RHSA-2014-0353.html
RedHat Security Advisories: RHSA-2014:0354
http://rhn.redhat.com/errata/RHSA-2014-0354.html
RedHat Security Advisories: RHSA-2014:0355
http://rhn.redhat.com/errata/RHSA-2014-0355.html
SuSE Security Announcement: openSUSE-SU-2014:0272 (Google Search)
http://lists.opensuse.org/opensuse-updates/2014-02/msg00064.html
SuSE Security Announcement: openSUSE-SU-2014:0273 (Google Search)
http://lists.opensuse.org/opensuse-updates/2014-02/msg00065.html
SuSE Security Announcement: openSUSE-SU-2015:0319 (Google Search)
http://lists.opensuse.org/opensuse-updates/2015-02/msg00078.html
SuSE Security Announcement: openSUSE-SU-2016:1067 (Google Search)
http://lists.opensuse.org/opensuse-updates/2016-04/msg00050.html
http://www.ubuntu.com/usn/USN-2098-1
Common Vulnerability Exposure (CVE) ID: CVE-2014-2525
BugTraq ID: 66478
http://www.securityfocus.com/bid/66478
Debian Security Information: DSA-2884 (Google Search)
http://www.debian.org/security/2014/dsa-2884
Debian Security Information: DSA-2885 (Google Search)
http://www.debian.org/security/2014/dsa-2885
http://www.ocert.org/advisories/ocert-2014-003.html
http://secunia.com/advisories/57836
http://secunia.com/advisories/57966
http://secunia.com/advisories/57968
SuSE Security Announcement: openSUSE-SU-2014:0500 (Google Search)
http://lists.opensuse.org/opensuse-updates/2014-04/msg00022.html
http://www.ubuntu.com/usn/USN-2160-1
CopyrightCopyright (C) 2022 Greenbone AG

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.