Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.1.10.2016.0257
Categoría:Mageia Linux Local Security Checks
Título:Mageia: Security Advisory (MGASA-2016-0257)
Resumen:The remote host is missing an update for the 'converseen, cuneiform-linux, imagemagick, inkscape, k3d, kcm-grub2, kxstitch, performous, perl-Image-SubImageFind, pfstools, pstoedit, pythonmagick, synfig, vdr-plugin-skinelchi, vdr-plugin-skinenigmang' package(s) announced via the MGASA-2016-0257 advisory.
Descripción:Summary:
The remote host is missing an update for the 'converseen, cuneiform-linux, imagemagick, inkscape, k3d, kcm-grub2, kxstitch, performous, perl-Image-SubImageFind, pfstools, pstoedit, pythonmagick, synfig, vdr-plugin-skinelchi, vdr-plugin-skinenigmang' package(s) announced via the MGASA-2016-0257 advisory.

Vulnerability Insight:
Updated imagemagick package fixes security vulnerabilities:

The OpenBlob function in blob.c in ImageMagick allows remote attackers to
execute arbitrary code via a (pipe) character at the start of a filename
(CVE-2016-5118).

Integer overflow in MagickCore/profile.c (CVE-2016-5841).

Buffer overread in MagickCore/property.c (CVE-2016-5842).

Also, several packages have been rebuilt to use the updated Magick++-6.Q16
library. These include converseen, cuneiform-linux, inkscape, k3d, kcm-grub2,
kxstitch, performous, perl-Image-SubImageFind, pfstools, pstoedit,
pythonmagick, synfig, vdr-plugin-skinelchi, and vdr-plugin-skinenigmang.

Affected Software/OS:
'converseen, cuneiform-linux, imagemagick, inkscape, k3d, kcm-grub2, kxstitch, performous, perl-Image-SubImageFind, pfstools, pstoedit, pythonmagick, synfig, vdr-plugin-skinelchi, vdr-plugin-skinenigmang' package(s) on Mageia 5.

Solution:
Please install the updated package(s).

CVSS Score:
10.0

CVSS Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2016-5118
BugTraq ID: 90938
http://www.securityfocus.com/bid/90938
Debian Security Information: DSA-3591 (Google Search)
http://www.debian.org/security/2016/dsa-3591
Debian Security Information: DSA-3746 (Google Search)
http://www.debian.org/security/2016/dsa-3746
http://www.openwall.com/lists/oss-security/2016/05/29/7
http://www.openwall.com/lists/oss-security/2016/05/30/1
RedHat Security Advisories: RHSA-2016:1237
https://access.redhat.com/errata/RHSA-2016:1237
http://www.securitytracker.com/id/1035984
http://www.securitytracker.com/id/1035985
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.397749
SuSE Security Announcement: SUSE-SU-2016:1570 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00021.html
SuSE Security Announcement: SUSE-SU-2016:1610 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00030.html
SuSE Security Announcement: SUSE-SU-2016:1614 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00032.html
SuSE Security Announcement: openSUSE-SU-2016:1521 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00008.html
SuSE Security Announcement: openSUSE-SU-2016:1522 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00009.html
SuSE Security Announcement: openSUSE-SU-2016:1534 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00011.html
SuSE Security Announcement: openSUSE-SU-2016:1653 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00047.html
http://www.ubuntu.com/usn/USN-2990-1
Common Vulnerability Exposure (CVE) ID: CVE-2016-5841
BugTraq ID: 91394
http://www.securityfocus.com/bid/91394
http://www.openwall.com/lists/oss-security/2016/06/23/1
http://www.openwall.com/lists/oss-security/2016/06/25/3
Common Vulnerability Exposure (CVE) ID: CVE-2016-5842
https://security.gentoo.org/glsa/201611-21
CopyrightCopyright (C) 2022 Greenbone AG

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.