Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.56156
Category:Ubuntu Local Security Checks
Title:Ubuntu USN-241-1 (apache)
Summary:NOSUMMARY
Description:Description:

The remote host is missing an update to apache
announced via advisory USN-241-1.

A security issue affects the following Ubuntu releases:

Ubuntu 4.10 (Warty Warthog)
Ubuntu 5.04 (Hoary Hedgehog)
Ubuntu 5.10 (Breezy Badger)

The following packages are affected: apache-common apache2-common apache2-mpm-worker

The mod_imap module (which provides support for image maps) did not
properly escape the referer URL which rendered it vulnerable against
a cross-site scripting attack. A malicious web page (or HTML email)
could trick a user into visiting a site running the vulnerable mod_imap,
and employ cross-site-scripting techniques to gather sensitive user
information from that site. (CVE-2005-3352)

Hartmut Keil discovered a Denial of Service vulnerability in the SSL
module (mod_ssl) that affects SSL-enabled virtual hosts with a
customized error page for error 400. By sending a specially crafted
request to the server, a remote attacker could crash the server. This
only affects Apache 2, and only if the worker implementation
(apache2-mpm-worker) is used. (CVE-2005-3357)

Solution:
The problem can be corrected by upgrading the affected package to
following versions:

Ubuntu 4.10:
apache-common 1.3.31-6ubuntu0.9
apache2-common 2.0.50-12ubuntu4.10
apache2-mpm-worker 2.0.50-12ubuntu4.10

Ubuntu 5.04:
apache-common 1.3.33-4ubuntu2
apache2-common 2.0.53-5ubuntu5.5
apache2-mpm-worker 2.0.53-5ubuntu5.5

Ubuntu 5.10:
apache-common 1.3.33-8ubuntu1
apache2-common 2.0.54-5ubuntu4
apache2-mpm-worker 2.0.54-5ubuntu4

In general, a standard system upgrade is sufficient to effect the
necessary changes.

http://www.securityspace.com/smysecure/catid.html?in=USN-241-1

Risk factor : Critical

CVSS Score:
10.0

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2005-3352
AIX APAR: PK16139
http://www-1.ibm.com/support/search.wss?rs=0&q=PK16139&apar=only
AIX APAR: PK25355
http://www-1.ibm.com/support/search.wss?rs=0&q=PK25355&apar=only
http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html
http://lists.apple.com/archives/security-announce/2008//May/msg00001.html
BugTraq ID: 15834
http://www.securityfocus.com/bid/15834
Cert/CC Advisory: TA08-150A
http://www.us-cert.gov/cas/techalerts/TA08-150A.html
Debian Security Information: DSA-1167 (Google Search)
http://www.debian.org/security/2006/dsa-1167
http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00060.html
http://www.securityfocus.com/archive/1/425399/100/0/threaded
http://www.gentoo.org/security/en/glsa/glsa-200602-03.xml
HPdes Security Advisory: HPSBMA02328
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01428449
HPdes Security Advisory: HPSBOV02683
http://marc.info/?l=bugtraq&m=130497311408250&w=2
HPdes Security Advisory: HPSBUX02145
http://www.securityfocus.com/archive/1/445206/100/0/threaded
HPdes Security Advisory: HPSBUX02164
http://www.securityfocus.com/archive/1/450321/100/0/threaded
HPdes Security Advisory: HPSBUX02172
http://www.securityfocus.com/archive/1/450315/100/0/threaded
HPdes Security Advisory: SSRT061202
HPdes Security Advisory: SSRT061265
HPdes Security Advisory: SSRT061269
HPdes Security Advisory: SSRT071293
HPdes Security Advisory: SSRT090208
http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2006:007
https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/reb542d2038e9c331506e0cbff881b47e40fbe2bd93ff00979e60cdf7@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rafd145ba6cd0a4ced113a5823cdaff45aeb36eb09855b216401c66d6@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r652fc951306cdeca5a276e2021a34878a76695a9f3cfb6490b4a6840@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf2f0f3611f937cf6cfb3b4fe4a67f69885855126110e1e3f2fb2728e@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r5001ecf3d6b2bdd0b732e527654248abb264f08390045d30709a92f6@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E
http://www.openpkg.org/security/OpenPKG-SA-2005.029-apache.txt
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10480
http://www.redhat.com/support/errata/RHSA-2006-0158.html
RedHat Security Advisories: RHSA-2006:0159
http://rhn.redhat.com/errata/RHSA-2006-0159.html
RedHat Security Advisories: RHSA-2006:0692
http://rhn.redhat.com/errata/RHSA-2006-0692.html
http://securitytracker.com/id?1015344
http://secunia.com/advisories/17319
http://secunia.com/advisories/18008
http://secunia.com/advisories/18333
http://secunia.com/advisories/18339
http://secunia.com/advisories/18340
http://secunia.com/advisories/18429
http://secunia.com/advisories/18517
http://secunia.com/advisories/18526
http://secunia.com/advisories/18585
http://secunia.com/advisories/18743
http://secunia.com/advisories/19012
http://secunia.com/advisories/20046
http://secunia.com/advisories/20670
http://secunia.com/advisories/21744
http://secunia.com/advisories/22140
http://secunia.com/advisories/22368
http://secunia.com/advisories/22388
http://secunia.com/advisories/22669
http://secunia.com/advisories/23260
http://secunia.com/advisories/25239
http://secunia.com/advisories/29420
http://secunia.com/advisories/29849
http://secunia.com/advisories/30430
SGI Security Advisory: 20060101-01-U
ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.685483
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.470158
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102662-1
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102663-1
SuSE Security Announcement: SUSE-SA:2006:043 (Google Search)
http://www.novell.com/linux/security/advisories/2006_43_apache.html
SuSE Security Announcement: SUSE-SR:2006:004 (Google Search)
http://lists.suse.de/archive/suse-security-announce/2006-Feb/0008.html
SuSE Security Announcement: SUSE-SR:2007:011 (Google Search)
http://lists.suse.com/archive/suse-security-announce/2007-May/0005.html
http://www.trustix.org/errata/2005/0074/
http://www.ubuntulinux.org/usn/usn-241-1
http://www.vupen.com/english/advisories/2005/2870
http://www.vupen.com/english/advisories/2006/2423
http://www.vupen.com/english/advisories/2006/3995
http://www.vupen.com/english/advisories/2006/4015
http://www.vupen.com/english/advisories/2006/4300
http://www.vupen.com/english/advisories/2006/4868
http://www.vupen.com/english/advisories/2008/0924/references
http://www.vupen.com/english/advisories/2008/1246/references
http://www.vupen.com/english/advisories/2008/1697
Common Vulnerability Exposure (CVE) ID: CVE-2005-3357
1015447
http://securitytracker.com/id?1015447
102640
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102640-1
102662
16152
http://www.securityfocus.com/bid/16152
18307
http://secunia.com/advisories/18307
18333
18339
18340
18429
18517
18585
18743
19012
20060101-01-U
21848
http://secunia.com/advisories/21848
22233
http://secunia.com/advisories/22233
22368
22523
http://secunia.com/advisories/22523
22669
22992
http://secunia.com/advisories/22992
23260
29849
30430
ADV-2006-0056
http://www.vupen.com/english/advisories/2006/0056
ADV-2006-3920
http://www.vupen.com/english/advisories/2006/3920
ADV-2006-3995
ADV-2006-4207
http://www.vupen.com/english/advisories/2006/4207
ADV-2006-4300
ADV-2006-4868
ADV-2008-1246
ADV-2008-1697
APPLE-SA-2008-05-28
FEDORA-2006-052
FLSA-2006:175406
GLSA-200602-03
HPSBMA02328
HPSBOV02683
HPSBUX02145
HPSBUX02172
RHSA-2006:0159
SSRT061202
SSRT061269
SSRT071293
SSRT090208
SUSE-SR:2006:004
SuSE-SA:2006:051
https://lists.opensuse.org/opensuse-security-announce/2006-09/msg00016.html
TA08-150A
TSLSA-2005-0074
USN-241-1
[httpd-cvs] 20190815 svn commit: r1048742 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html
https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E
[httpd-cvs] 20190815 svn commit: r1048743 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html
https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E
[httpd-cvs] 20200401 svn commit: r1058586 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html
https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E
[httpd-cvs] 20200401 svn commit: r1058587 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html
https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E
[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
[httpd-cvs] 20210330 svn commit: r1073139 [4/13] - in /websites/staging/httpd/trunk/content: ./ security/json/
https://lists.apache.org/thread.html/reb542d2038e9c331506e0cbff881b47e40fbe2bd93ff00979e60cdf7%40%3Ccvs.httpd.apache.org%3E
[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html
https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E
[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/
https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E
[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
[httpd-cvs] 20210330 svn commit: r1073149 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/
https://lists.apache.org/thread.html/rafd145ba6cd0a4ced113a5823cdaff45aeb36eb09855b216401c66d6%40%3Ccvs.httpd.apache.org%3E
[httpd-cvs] 20210330 svn commit: r1888194 [4/13] - /httpd/site/trunk/content/security/json/
https://lists.apache.org/thread.html/r652fc951306cdeca5a276e2021a34878a76695a9f3cfb6490b4a6840%40%3Ccvs.httpd.apache.org%3E
[httpd-cvs] 20210603 svn commit: r1075360 [1/3] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html
https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4%40%3Ccvs.httpd.apache.org%3E
[httpd-cvs] 20210603 svn commit: r1075360 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html
https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E
[httpd-cvs] 20210606 svn commit: r1075467 [1/2] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html
https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10%40%3Ccvs.httpd.apache.org%3E
[httpd-cvs] 20210606 svn commit: r1075467 [2/2] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html
https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E
[httpd-cvs] 20210606 svn commit: r1075470 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html
https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E
http://issues.apache.org/bugzilla/show_bug.cgi?id=37791
http://support.avaya.com/elmodocs2/security/ASA-2006-250.htm
http://svn.apache.org/viewcvs?rev=358026&view=rev
http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=3117
oval:org.mitre.oval:def:11467
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11467
Common Vulnerability Exposure (CVE) ID: CVE-2005-3191
BugTraq ID: 15726
http://www.securityfocus.com/bid/15726
BugTraq ID: 15727
http://www.securityfocus.com/bid/15727
Bugtraq: 20051207 [KDE Security Advisory] multiple buffer overflows in kpdf/koffice (Google Search)
http://www.securityfocus.com/archive/1/418883/100/0/threaded
Debian Security Information: DSA-931 (Google Search)
http://www.debian.org/security/2005/dsa-931
Debian Security Information: DSA-932 (Google Search)
http://www.debian.org/security/2005/dsa-932
Debian Security Information: DSA-936 (Google Search)
http://www.debian.org/security/2006/dsa-936
Debian Security Information: DSA-937 (Google Search)
http://www.debian.org/security/2005/dsa-937
Debian Security Information: DSA-938 (Google Search)
http://www.debian.org/security/2005/dsa-938
Debian Security Information: DSA-940 (Google Search)
http://www.debian.org/security/2005/dsa-940
Debian Security Information: DSA-950 (Google Search)
http://www.debian.org/security/2006/dsa-950
Debian Security Information: DSA-961 (Google Search)
http://www.debian.org/security/2006/dsa-961
Debian Security Information: DSA-962 (Google Search)
http://www.debian.org/security/2006/dsa-962
http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00015.html
http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00016.html
http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00036.html
http://www.redhat.com/archives/fedora-announce-list/2005-December/msg00037.html
http://www.securityfocus.com/archive/1/427053/100/0/threaded
http://www.securityfocus.com/archive/1/427990/100/0/threaded
http://www.gentoo.org/security/en/glsa/glsa-200512-08.xml
http://www.gentoo.org/security/en/glsa/glsa-200601-02.xml
http://www.idefense.com/application/poi/display?id=343&type=vulnerabilities
http://www.idefense.com/application/poi/display?id=342&type=vulnerabilities
http://www.mandriva.com/security/advisories?name=MDKSA-2006:010
http://www.mandriva.com/security/advisories?name=MDKSA-2006:003
http://www.mandriva.com/security/advisories?name=MDKSA-2006:004
http://www.mandriva.com/security/advisories?name=MDKSA-2006:005
http://www.mandriva.com/security/advisories?name=MDKSA-2006:006
http://www.mandriva.com/security/advisories?name=MDKSA-2006:008
http://www.mandriva.com/security/advisories?name=MDKSA-2006:011
http://www.mandriva.com/security/advisories?name=MDKSA-2006:012
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=342289
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9760
http://www.redhat.com/support/errata/RHSA-2005-840.html
http://www.redhat.com/support/errata/RHSA-2005-867.html
RedHat Security Advisories: RHSA-2005:868
http://rhn.redhat.com/errata/RHSA-2005-868.html
http://www.redhat.com/support/errata/RHSA-2005-878.html
http://www.redhat.com/support/errata/RHSA-2006-0160.html
SCO Security Bulletin: SCOSA-2006.15
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt
SCO Security Bulletin: SCOSA-2006.20
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.20/SCOSA-2006.20.txt
SCO Security Bulletin: SCOSA-2006.21
ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.21/SCOSA-2006.21.txt
http://securitytracker.com/id?1015309
http://securitytracker.com/id?1015324
http://secunia.com/advisories/17897
http://secunia.com/advisories/17908
http://secunia.com/advisories/17912
http://secunia.com/advisories/17916
http://secunia.com/advisories/17920
http://secunia.com/advisories/17921
http://secunia.com/advisories/17926
http://secunia.com/advisories/17929
http://secunia.com/advisories/17940
http://secunia.com/advisories/17955
http://secunia.com/advisories/17976
http://secunia.com/advisories/18009
http://secunia.com/advisories/18055
http://secunia.com/advisories/18061
http://secunia.com/advisories/18147
http://secunia.com/advisories/18189
http://secunia.com/advisories/18191
http://secunia.com/advisories/18192
http://secunia.com/advisories/18303
http://secunia.com/advisories/18313
http://secunia.com/advisories/18336
http://secunia.com/advisories/18349
http://secunia.com/advisories/18380
http://secunia.com/advisories/18385
http://secunia.com/advisories/18387
http://secunia.com/advisories/18389
http://secunia.com/advisories/18398
http://secunia.com/advisories/18407
http://secunia.com/advisories/18416
http://secunia.com/advisories/18428
http://secunia.com/advisories/18436
http://secunia.com/advisories/18448
http://secunia.com/advisories/18503
http://secunia.com/advisories/18534
http://secunia.com/advisories/18549
http://secunia.com/advisories/18554
http://secunia.com/advisories/18582
http://secunia.com/advisories/18674
http://secunia.com/advisories/18675
http://secunia.com/advisories/18679
http://secunia.com/advisories/18908
http://secunia.com/advisories/18913
http://secunia.com/advisories/19230
http://secunia.com/advisories/19377
http://secunia.com/advisories/19797
http://secunia.com/advisories/19798
http://secunia.com/advisories/25729
http://secunia.com/advisories/26413
SGI Security Advisory: 20051201-01-U
ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U
SGI Security Advisory: 20060201-01-U
ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.474747
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.472683
http://securityreason.com/securityalert/233
http://securityreason.com/securityalert/234
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102972-1
SuSE Security Announcement: SUSE-SA:2006:001 (Google Search)
http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html
SuSE Security Announcement: SUSE-SR:2005:029 (Google Search)
http://www.novell.com/linux/security/advisories/2005_29_sr.html
SuSE Security Announcement: SUSE-SR:2006:001 (Google Search)
SuSE Security Announcement: SUSE-SR:2006:002 (Google Search)
http://www.novell.com/linux/security/advisories/2006_02_sr.html
http://www.trustix.org/errata/2005/0072/
http://www.ubuntulinux.org/usn/usn-227-1
http://www.vupen.com/english/advisories/2005/2786
http://www.vupen.com/english/advisories/2005/2787
http://www.vupen.com/english/advisories/2005/2788
http://www.vupen.com/english/advisories/2005/2789
http://www.vupen.com/english/advisories/2005/2790
http://www.vupen.com/english/advisories/2005/2856
http://www.vupen.com/english/advisories/2007/2280
XForce ISS Database: xpdf-dctstream-baseline-bo(23444)
https://exchange.xforce.ibmcloud.com/vulnerabilities/23444
XForce ISS Database: xpdf-dctstream-progressive-bo(23443)
https://exchange.xforce.ibmcloud.com/vulnerabilities/23443
Common Vulnerability Exposure (CVE) ID: CVE-2005-3192
BugTraq ID: 15725
http://www.securityfocus.com/bid/15725
http://www.debian.org/security/2006/dsa-937
http://www.idefense.com/application/poi/display?id=344&type=vulnerabilities
http://scary.beasts.org/security/CESA-2005-003.txt
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10914
http://secunia.com/advisories/17897/
http://securityreason.com/securityalert/235
http://securityreason.com/securityalert/240
http://www.vupen.com/english/advisories/2005/2755
XForce ISS Database: xpdf-streampredictor-bo(23442)
https://exchange.xforce.ibmcloud.com/vulnerabilities/23442
Common Vulnerability Exposure (CVE) ID: CVE-2005-3624
102972
16143
http://www.securityfocus.com/bid/16143
18147
18303
18312
http://secunia.com/advisories/18312
18313
18329
http://secunia.com/advisories/18329
18332
http://secunia.com/advisories/18332
18334
http://secunia.com/advisories/18334
18338
http://secunia.com/advisories/18338
18349
18373
http://secunia.com/advisories/18373
18375
http://secunia.com/advisories/18375
18380
18385
18387
18389
18398
18407
18414
http://secunia.com/advisories/18414
18416
18423
http://secunia.com/advisories/18423
18425
http://secunia.com/advisories/18425
18428
18436
18448
18463
http://secunia.com/advisories/18463
18534
18554
18582
18642
http://secunia.com/advisories/18642
18644
http://secunia.com/advisories/18644
18674
18675
18679
18908
18913
19230
19377
20051201-01-U
2006-0002
http://www.trustix.org/errata/2006/0002/
20060201-01-U
25729
ADV-2006-0047
http://www.vupen.com/english/advisories/2006/0047
ADV-2007-2280
DSA-931
DSA-932
DSA-936
DSA-937
DSA-938
DSA-940
DSA-950
DSA-961
DSA-962
FEDORA-2005-025
http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00030.html
FEDORA-2005-026
http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00031.html
FLSA-2006:176751
FLSA:175404
GLSA-200601-02
GLSA-200601-17
http://www.gentoo.org/security/en/glsa/glsa-200601-17.xml
MDKSA-2006:003
MDKSA-2006:004
MDKSA-2006:005
MDKSA-2006:006
MDKSA-2006:008
MDKSA-2006:010
MDKSA-2006:011
MDKSA-2006:012
RHSA-2006:0160
RHSA-2006:0163
http://www.redhat.com/support/errata/RHSA-2006-0163.html
RHSA-2006:0177
http://rhn.redhat.com/errata/RHSA-2006-0177.html
SCOSA-2006.15
SSA:2006-045-04
SSA:2006-045-09
SUSE-SA:2006:001
USN-236-1
https://usn.ubuntu.com/236-1/
http://www.kde.org/info/security/advisory-20051207-2.txt
oval:org.mitre.oval:def:9437
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9437
xpdf-ccitt-faxstream-bo(24022)
https://exchange.xforce.ibmcloud.com/vulnerabilities/24022
Common Vulnerability Exposure (CVE) ID: CVE-2005-3625
18335
http://secunia.com/advisories/18335
http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00010.html
http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00011.html
oval:org.mitre.oval:def:9575
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9575
xpdf-ccittfaxdecode-dctdecode-dos(24023)
https://exchange.xforce.ibmcloud.com/vulnerabilities/24023
Common Vulnerability Exposure (CVE) ID: CVE-2005-3626
oval:org.mitre.oval:def:9992
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9992
xpdf-flatedecode-dos(24026)
https://exchange.xforce.ibmcloud.com/vulnerabilities/24026
Common Vulnerability Exposure (CVE) ID: CVE-2005-3627
oval:org.mitre.oval:def:10200
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10200
xpdf-readhuffmantables-bo(24024)
https://exchange.xforce.ibmcloud.com/vulnerabilities/24024
xpdf-readscaninfo-bo(24025)
https://exchange.xforce.ibmcloud.com/vulnerabilities/24025
Common Vulnerability Exposure (CVE) ID: CVE-2005-3628
oval:org.mitre.oval:def:10287
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10287
Common Vulnerability Exposure (CVE) ID: CVE-2005-2475
BugTraq ID: 14450
http://www.securityfocus.com/bid/14450
Bugtraq: 20050801 unzip TOCTOU file-permissions vulnerability (Google Search)
http://marc.info/?l=bugtraq&m=112300046224117&w=2
Debian Security Information: DSA-903 (Google Search)
http://www.debian.org/security/2005/dsa-903
http://www.mandriva.com/security/advisories?name=MDKSA-2005:197
http://www.osvdb.org/18530
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9975
http://www.redhat.com/support/errata/RHSA-2007-0203.html
SCO Security Bulletin: SCOSA-2005.39
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.39/SCOSA-2005.39.txt
http://secunia.com/advisories/16309
http://secunia.com/advisories/16985
http://secunia.com/advisories/17006
http://secunia.com/advisories/17045
http://secunia.com/advisories/17342
http://secunia.com/advisories/17653
http://secunia.com/advisories/25098
http://securityreason.com/securityalert/32
http://www.trustix.org/errata/2005/0053/
http://www.ubuntu.com/usn/usn-191-1
Common Vulnerability Exposure (CVE) ID: CVE-2006-0162
BugTraq ID: 16191
http://www.securityfocus.com/bid/16191
CERT/CC vulnerability note: VU#385908
http://www.kb.cert.org/vuls/id/385908
Debian Security Information: DSA-947 (Google Search)
http://www.debian.org/security/2006/dsa-947
http://lists.grok.org.uk/pipermail/full-disclosure/2006-January/041325.html
http://www.gentoo.org/security/en/glsa/glsa-200601-07.xml
http://www.mandriva.com/security/advisories?name=MDKSA-2006:016
http://www.zerodayinitiative.com/advisories/ZDI-06-001.html
http://www.osvdb.org/22318
http://securitytracker.com/id?1015457
http://secunia.com/advisories/18379
http://secunia.com/advisories/18453
http://secunia.com/advisories/18478
http://secunia.com/advisories/18548
http://securityreason.com/securityalert/342
http://www.vupen.com/english/advisories/2006/0116
XForce ISS Database: clamav-libclamav-upx-bo(24047)
https://exchange.xforce.ibmcloud.com/vulnerabilities/24047
Common Vulnerability Exposure (CVE) ID: CVE-2005-4591
BugTraq ID: 16171
http://www.securityfocus.com/bid/16171
http://secunia.com/advisories/18352
http://secunia.com/advisories/18427
http://secunia.com/advisories/18717
SuSE Security Announcement: SUSE-SR:2006:003 (Google Search)
http://lists.suse.com/archive/suse-security-announce/2006-Feb/0001.html
https://usn.ubuntu.com/240-1/
http://www.vupen.com/english/advisories/2006/0100
XForce ISS Database: bogofilter-unicode-bo(24118)
https://exchange.xforce.ibmcloud.com/vulnerabilities/24118
CopyrightCopyright (c) 2006 E-Soft Inc. http://www.securityspace.com

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.