![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.1.10.2016.0286 |
Categoría: | Mageia Linux Local Security Checks |
Título: | Mageia: Security Advisory (MGASA-2016-0286) |
Resumen: | The remote host is missing an update for the 'mupdf' package(s) announced via the MGASA-2016-0286 advisory. |
Descripción: | Summary: The remote host is missing an update for the 'mupdf' package(s) announced via the MGASA-2016-0286 advisory. Vulnerability Insight: A flaw was discovered in the pdf_load_mesh_params() function allowing out-of-bounds write access to memory locations. With carefully crafted input, that could trigger a heap overflow, resulting in application crash or possibly having other unspecified impact (CVE-2016-6525). Also, mupdf already contained the X11 viewer /usr/bin/mupdf-x11 but no mupdf binary to match the man page instructions. A symlink to mupdf-x11 now provides this (mga#19105). Affected Software/OS: 'mupdf' package(s) on Mageia 5. Solution: Please install the updated package(s). CVSS Score: 7.5 CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2016-6525 BugTraq ID: 92266 http://www.securityfocus.com/bid/92266 Debian Security Information: DSA-3655 (Google Search) http://www.debian.org/security/2016/dsa-3655 https://security.gentoo.org/glsa/201702-12 http://www.openwall.com/lists/oss-security/2016/08/03/8 |
Copyright | Copyright (C) 2022 Greenbone AG |
Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |