Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.59651
Category:Trustix Local Security Checks
Title:Trustix Security Advisory TSLSA-2007-0009 (gnupg, php4)
Summary:NOSUMMARY
Description:Description:

The remote host is missing updates announced in
advisory TSLSA-2007-0009.

gnupg < TSL 3.0.5 > < TSL 3.0 >
- New Upstream.
- SECURITY Fix: GnuPG 1.4.6 and earlier, when run from the command
line, does not visually distinguish signed and unsigned portions
of OpenPGP messages with multiple components, which might allow
remote attackers to forge the contents of a message without
detection.

The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the name CVE-2007-1263 to this issue.

php4 < TSL 2.2 > < TSEL 2 >
- New Upstream.
- Fixes crash problem with the session extension when register_globals
is turned on.
- SECURITY Fix: Several vulnerabilities have been reported in PHP,
which can be exploited by malicious people to disclose potentially
sensitive information, cause a DoS and potentially compromise a
vulnerable system. (SA24089)

Solution:
Update your system with the packages as indicated in
the referenced security advisory.

http://www.securityspace.com/smysecure/catid.html?in=TSLSA-2007-0009

Risk factor : Medium

CVSS Score:
5.0

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2007-1263
BugTraq ID: 22757
http://www.securityfocus.com/bid/22757
Bugtraq: 20070305 CORE-2007-0115: GnuPG and GnuPG clients unsigned data injection vulnerability (Google Search)
http://www.securityfocus.com/archive/1/461958/100/0/threaded
http://www.securityfocus.com/archive/1/461958/30/7710/threaded
Debian Security Information: DSA-1266 (Google Search)
http://www.debian.org/security/2007/dsa-1266
http://fedoranews.org/cms/node/2776
http://fedoranews.org/cms/node/2775
http://www.mandriva.com/security/advisories?name=MDKSA-2007:059
http://www.coresecurity.com/?action=item&id=1687
http://lists.gnupg.org/pipermail/gnupg-users/2007-March/030514.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10496
http://www.redhat.com/support/errata/RHSA-2007-0106.html
http://www.redhat.com/support/errata/RHSA-2007-0107.html
http://www.securitytracker.com/id?1017727
http://secunia.com/advisories/24365
http://secunia.com/advisories/24407
http://secunia.com/advisories/24419
http://secunia.com/advisories/24420
http://secunia.com/advisories/24438
http://secunia.com/advisories/24489
http://secunia.com/advisories/24511
http://secunia.com/advisories/24544
http://secunia.com/advisories/24650
http://secunia.com/advisories/24734
http://secunia.com/advisories/24875
SGI Security Advisory: 20070301-01-P
ftp://patches.sgi.com/support/free/security/advisories/20070301-01-P.asc
http://securityreason.com/securityalert/2353
SuSE Security Announcement: SUSE-SA:2007:024 (Google Search)
http://lists.suse.com/archive/suse-security-announce/2007-Mar/0008.html
http://www.trustix.org/errata/2007/0009/
http://www.ubuntu.com/usn/usn-432-1
http://www.ubuntu.com/usn/usn-432-2
http://www.vupen.com/english/advisories/2007/0835
CopyrightCopyright (c) 2007 E-Soft Inc. http://www.securityspace.com

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.