Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.1.10.2017.0239
Categoría:Mageia Linux Local Security Checks
Título:Mageia: Security Advisory (MGASA-2017-0239)
Resumen:The remote host is missing an update for the 'spice, spice-protocol' package(s) announced via the MGASA-2017-0239 advisory.
Descripción:Summary:
The remote host is missing an update for the 'spice, spice-protocol' package(s) announced via the MGASA-2017-0239 advisory.

Vulnerability Insight:
A vulnerability was discovered in spice, in the server's protocol handling. An
authenticated attacker could send specially crafted messages to the spice
server, causing out-of-bounds memory accesses leading to parts of server memory
being leaked or a crash (CVE-2017-7506).

The Mageia 5 package has been patched to fix this issue. The Mageia 6 package
has been updated to version 0.13.90, containing fixes for this and several other
issues.

Affected Software/OS:
'spice, spice-protocol' package(s) on Mageia 5, Mageia 6.

Solution:
Please install the updated package(s).

CVSS Score:
6.5

CVSS Vector:
AV:N/AC:L/Au:S/C:P/I:P/A:P

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2017-7506
99583
http://www.securityfocus.com/bid/99583
DSA-3907
http://www.debian.org/security/2017/dsa-3907
RHSA-2017:2471
https://access.redhat.com/errata/RHSA-2017:2471
RHSA-2018:3522
https://access.redhat.com/errata/RHSA-2018:3522
[oss-security] 20170714 CVE-2017-7506 spice: Possible buffer overflow via invalid monitor configurations
http://www.openwall.com/lists/oss-security/2017/07/14/1
https://bugzilla.redhat.com/show_bug.cgi?id=1452606
CopyrightCopyright (C) 2022 Greenbone AG

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.