Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.1.10.2016.0424
Categoría:Mageia Linux Local Security Checks
Título:Mageia: Security Advisory (MGASA-2016-0424)
Resumen:The remote host is missing an update for the 'gstreamer0.10-plugins-good, gstreamer1.0-plugins-good' package(s) announced via the MGASA-2016-0424 advisory.
Descripción:Summary:
The remote host is missing an update for the 'gstreamer0.10-plugins-good, gstreamer1.0-plugins-good' package(s) announced via the MGASA-2016-0424 advisory.

Vulnerability Insight:
Multiple flaws were discovered in GStreamer's FLC/FLI/FLX media file
format decoding plug-in. A remote attacker could use these flaws to
cause an application using GStreamer to crash or, potentially, execute
arbitrary code with the privileges of the user running the application
(CVE-2016-9634, CVE-2016-9635, CVE-2016-9636, CVE-2016-9808).

An invalid memory read access flaw was found in GStreamer's FLC/FLI/FLX
media file format decoding plug-in. A remote attacker could use this
flaw to cause an application using GStreamer to crash
(CVE-2016-9807, CVE-2016-9810).

Note that CVE-2016-9810 only affected gstreamer1.0-plugins-good.

Affected Software/OS:
'gstreamer0.10-plugins-good, gstreamer1.0-plugins-good' package(s) on Mageia 5.

Solution:
Please install the updated package(s).

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2016-9634
BugTraq ID: 94499
http://www.securityfocus.com/bid/94499
Debian Security Information: DSA-3723 (Google Search)
http://www.debian.org/security/2016/dsa-3723
Debian Security Information: DSA-3724 (Google Search)
http://www.debian.org/security/2016/dsa-3724
https://security.gentoo.org/glsa/201705-10
https://scarybeastsecurity.blogspot.com/2016/11/0day-exploit-advancing-exploitation.html
http://www.openwall.com/lists/oss-security/2016/11/24/2
RedHat Security Advisories: RHSA-2016:2975
http://rhn.redhat.com/errata/RHSA-2016-2975.html
RedHat Security Advisories: RHSA-2017:0019
http://rhn.redhat.com/errata/RHSA-2017-0019.html
RedHat Security Advisories: RHSA-2017:0020
http://rhn.redhat.com/errata/RHSA-2017-0020.html
Common Vulnerability Exposure (CVE) ID: CVE-2016-9635
Common Vulnerability Exposure (CVE) ID: CVE-2016-9636
Common Vulnerability Exposure (CVE) ID: CVE-2016-9807
BugTraq ID: 95148
http://www.securityfocus.com/bid/95148
http://www.openwall.com/lists/oss-security/2016/12/01/2
http://www.openwall.com/lists/oss-security/2016/12/05/8
Common Vulnerability Exposure (CVE) ID: CVE-2016-9808
BugTraq ID: 95446
http://www.securityfocus.com/bid/95446
https://scarybeastsecurity.blogspot.com/2016/11/0day-poc-incorrect-fix-for-gstreamer.html
Common Vulnerability Exposure (CVE) ID: CVE-2016-9810
BugTraq ID: 95163
http://www.securityfocus.com/bid/95163
RedHat Security Advisories: RHSA-2017:2060
https://access.redhat.com/errata/RHSA-2017:2060
CopyrightCopyright (C) 2022 Greenbone AG

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.