Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.1.10.2025.0121
Categoría:Mageia Linux Local Security Checks
Título:Mageia: Security Advisory (MGASA-2025-0121)
Resumen:The remote host is missing an update for the 'zvbi' package(s) announced via the MGASA-2025-0121 advisory.
Descripción:Summary:
The remote host is missing an update for the 'zvbi' package(s) announced via the MGASA-2025-0121 advisory.

Vulnerability Insight:
A vulnerability was found in libzvbi up to 0.2.43. It has been
classified as problematic. Affected is the function
vbi_strndup_iconv_ucs2 of the file src/conv.c. The manipulation of the
argument src_length leads to uninitialized pointer. It is possible to
launch the attack remotely. The exploit has been disclosed to the public
and may be used. Upgrading to version 0.2.44 is able to address this
issue (CVE-2025-2173).
A vulnerability classified as critical has been found in libzvbi up to
0.2.43. This affects the function vbi_capture_sim_load_caption of the
file src/io-sim.c. The manipulation leads to integer overflow. It is
possible to initiate the attack remotely. The exploit has been disclosed
to the public and may be used. Upgrading to version 0.2.44 is able to
address this issue(A vulnerability classified as critical has been found
in libzvbi up to 0.2.43. This affects the function
vbi_capture_sim_load_caption of the file src/io-sim.c. The manipulation
leads to integer overflow. It is possible to initiate the attack
remotely. The exploit has been disclosed to the public and may be used.
Upgrading to version 0.2.44 is able to address this
issue (CVE-2025-2176).
A vulnerability was found in libzvbi up to 0.2.43. It has been rated as
problematic. Affected by this issue is the function _vbi_strndup_iconv.
The manipulation leads to integer overflow. The attack may be launched
remotely. The exploit has been disclosed to the public and may be used.
Upgrading to version 0.2.44 is able to address this
issue (CVE-2025-2175).
A vulnerability classified as critical was found in libzvbi up to
0.2.43. This vulnerability affects the function vbi_search_new of the
file src/search.c. The manipulation of the argument pat_len leads to
integer overflow. The attack can be initiated remotely. The exploit has
been disclosed to the public and may be used. Upgrading to version
0.2.44 is able to address this issue (CVE-2025-2177)
A vulnerability was found in libzvbi up to 0.2.43. It has been declared
as problematic. Affected by this vulnerability is the function
vbi_strndup_iconv_ucs2 of the file src/conv.c. The manipulation of the
argument src_length leads to integer overflow. The attack can be
launched remotely. The exploit has been disclosed to the public and may
be used. Upgrading to version 0.2.44 is able to address this
issue (CVE-2025-2174).

Affected Software/OS:
'zvbi' package(s) on Mageia 9.

Solution:
Please install the updated package(s).

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2025-2173
Common Vulnerability Exposure (CVE) ID: CVE-2025-2174
Common Vulnerability Exposure (CVE) ID: CVE-2025-2175
Common Vulnerability Exposure (CVE) ID: CVE-2025-2176
Common Vulnerability Exposure (CVE) ID: CVE-2025-2177
CopyrightCopyright (C) 2025 Greenbone AG

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.