Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.1.10.2014.0174
Categoría:Mageia Linux Local Security Checks
Título:Mageia: Security Advisory (MGASA-2014-0174)
Resumen:The remote host is missing an update for the 'jbigkit' package(s) announced via the MGASA-2014-0174 advisory.
Descripción:Summary:
The remote host is missing an update for the 'jbigkit' package(s) announced via the MGASA-2014-0174 advisory.

Vulnerability Insight:
Updated jbigkit packages fix security vulnerability:

Florian Weimer found a stack-based buffer overflow flaw in the libjbig library
(part of jbigkit). A specially-crafted image file read by libjbig could be
used to cause a program linked to libjbig to crash or, potentially, to execute
arbitrary code (CVE-2013-6369).

The jbigkit package has been updated to version 2.1, which fixes this issue,
as well as a few other bugs, including the ability of corrupted input data to
force the jbig85 decoder into an end-less loop.

Affected Software/OS:
'jbigkit' package(s) on Mageia 3, Mageia 4.

Solution:
Please install the updated package(s).

CVSS Score:
6.8

CVSS Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2013-6369
57731
http://secunia.com/advisories/57731
66697
http://www.securityfocus.com/bid/66697
https://bugzilla.redhat.com/show_bug.cgi?id=1032273
https://www.cl.cam.ac.uk/~mgk25/jbigkit/CHANGES
CopyrightCopyright (C) 2022 Greenbone AG

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.