Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.57600
Category:Trustix Local Security Checks
Title:Trustix Security Advisory TSLSA-2006-0063 (Multiple packages)
Summary:NOSUMMARY
Description:Description:

The remote host is missing updates announced in
advisory TSLSA-2006-0063.

bind < TSL 3.0 > < TSL 2.2 > < TSEL 2 >
- New Upstream.
- SECURITY Fix: Raise the minimum safe OpenSSL versions to OpenSSL
0.9.7l and OpenSSL 0.9.8d. Versions prior to these have known
security flaws which are exploitable in named. [RT #16391]
- Change the default RSA exponent from 3 to 65537.

openssh < TSL 3.0 > < TSL 2.2 > < TSEL 2 >
- New upstream.
- SECURITY Fix: A weakness has been reported in OpenSSH, which
can be exploited by malicious people to bypass certain security
restrictions. The weakness is caused due to an error within the
privilege separation monitor, which may weaken the authentication
process (SA22771).

rpm < TSL 3.0 >
- SECURITY Fix: A vulnerability has been reported in RPM, caused due
to a boundary error when processing certain RPM packages. This can
be exploited to cause a heap-based buffer overflow by e.g. tricking
a user into querying a specially crafted RPM package.

The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the name CVE-2006-5466 to this issue.

texinfo < TSL 3.0 > < TSL 2.2 > < TSEL 2 >
- SECURITY Fix: Buffer overflow in the texi2dvi and texindex commands
allows local users to execute arbitrary code via a crafted Texinfo
file.

The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the name CVE-2006-4810 to this issue.

Solution:
Update your system with the packages as indicated in
the referenced security advisory.

http://www.securityspace.com/smysecure/catid.html?in=TSLSA-2006-0063

Risk factor : High

CVSS Score:
5.4

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2006-5466
1017160
http://securitytracker.com/id?1017160
20906
http://www.securityfocus.com/bid/20906
22740
http://secunia.com/advisories/22740
22745
http://secunia.com/advisories/22745
22768
http://secunia.com/advisories/22768
22854
http://secunia.com/advisories/22854
ADV-2006-4350
http://www.vupen.com/english/advisories/2006/4350
GLSA-200611-08
http://security.gentoo.org/glsa/glsa-200611-08.xml
MDKSA-2006:200
http://www.mandriva.com/security/advisories?name=MDKSA-2006:200
USN-378-1
http://www.ubuntu.com/usn/usn-378-1
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=212833
Common Vulnerability Exposure (CVE) ID: CVE-2006-4810
2006-0063
http://www.trustix.org/errata/2006/0063/
20061101-01-P
ftp://patches.sgi.com/support/free/security/advisories/20061101-01-P
20061127 rPSA-2006-0219-1 info install-info texinfo
http://www.securityfocus.com/archive/1/452723/100/0/threaded
20070404 VMSA-2007-0003 VMware ESX 3.0.1 and 3.0.0 server security updates
http://www.securityfocus.com/archive/1/464745/100/0/threaded
20959
http://www.securityfocus.com/bid/20959
22725
http://secunia.com/advisories/22725
22777
http://secunia.com/advisories/22777
22798
http://secunia.com/advisories/22798
22898
http://secunia.com/advisories/22898
22929
http://secunia.com/advisories/22929
22995
http://secunia.com/advisories/22995
23015
http://secunia.com/advisories/23015
23112
http://secunia.com/advisories/23112
23335
http://secunia.com/advisories/23335
24788
http://secunia.com/advisories/24788
ADV-2006-4412
http://www.vupen.com/english/advisories/2006/4412
ADV-2007-1267
http://www.vupen.com/english/advisories/2007/1267
DSA-1219
http://www.debian.org/security/2006/dsa-1219
GLSA-200611-16
http://security.gentoo.org/glsa/glsa-200611-16.xml
MDKSA-2006:203
http://www.mandriva.com/security/advisories?name=MDKSA-2006:203
OpenPKG-SA-2006.034
http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.034-texinfo.html
RHSA-2006:0727
http://www.redhat.com/support/errata/RHSA-2006-0727.html
SUSE-SR:2006:028
http://www.novell.com/linux/security/advisories/2006_28_sr.html
USN-379-1
http://www.ubuntu.com/usn/usn-379-1
http://cvs.savannah.gnu.org/viewcvs/texinfo/texinfo/util/texindex.c?r1=1.16&r2=1.17
http://www.vmware.com/support/vi3/doc/esx-1121906-patch.html
http://www.vmware.com/support/vi3/doc/esx-2559638-patch.html
https://issues.rpath.com/browse/RPL-810
oval:org.mitre.oval:def:10893
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10893
texinfo-texindex-bo(30158)
https://exchange.xforce.ibmcloud.com/vulnerabilities/30158
CopyrightCopyright (c) 2006 E-Soft Inc. http://www.securityspace.com

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.