Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.59655
Category:Trustix Local Security Checks
Title:Trustix Security Advisory TSLSA-2007-0019 (Multiple packages)
Summary:NOSUMMARY
Description:Description:

The remote host is missing updates announced in
advisory TSLSA-2007-0019.

fetchmail < TSL 3.0.5 > < TSL 3.0 >
- New upsteam.
- SECURITY Fix: A weakness has been identified which is caused
by an error in the APOP protocol that fails to properly prevent
MD5 collisions, which could be exploited via man-in-the-middle
attacks and specially crafted message-IDs to potentially disclose
the first three characters of passwords.

The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the names CVE-2007-1558 to this issue.

freetype < TSL 3.0.5 > < TSL 3.0 > < TSL 2.2 >
- SECURITY Fix: Victor Stinner has reported a vulnerability in
FreeType, caused due to an error when parsing malformed TTF
fonts in src/truetype/ttgload.c and may be exploited when
processing a specially crafted TTF font.

The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the name CVE-2007-2754 to this issue.

gd < TSL 3.0.5 > < TSL 3.0 > < TSL 2.2 >
- SECURITY Fix: Xavier Roche has reported a vulnerability in GD
Graphics Library caused due to the incorrect use of libpng within
the function gdPngReadData() when processing truncated data.
This can be exploited to cause an infinite loop by e.g. tricking
an application using the library to process a specially crafted file.

The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the name CVE-2007-2756 to this issue.

libpng < TSL 3.0.5 > < TSL 3.0 >< TSL 2.2 > < TSEL 2>
- SECURITY Fix: A vulnerability has been reported in libpng, caused
due to an error in the png_handle_tRNS function in pngrutil.c.
This can be exploited by tricking an application using the library
to process a specially crafted PNG file containing a malformed
tRNS chunk.

The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the name CVE-2007-2445 to this issue.

python24 < TSL 3.0.5 >
- SECURITY Fix: A vulnerability has been identified, which could
be exploited by attackers to gain knowledge of potentially
sensitive information. This issue is caused by an off-by-one
error in the PyLocale_strxfrm() [Modules/_localemodule.c]
function when calculating the n2 buffer size, which could be
exploited by attackers to disclose and read portions of memory.

The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the name CVE-2007-2052 to this issue.

Solution:
Update your system with the packages as indicated in
the referenced security advisory.

http://www.securityspace.com/smysecure/catid.html?in=TSLSA-2007-0019

Risk factor : High

CVSS Score:
6.8

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2007-1558
http://lists.apple.com/archives/security-announce/2007/May/msg00004.html
BugTraq ID: 23257
http://www.securityfocus.com/bid/23257
Bugtraq: 20070402 APOP vulnerability (Google Search)
http://www.securityfocus.com/archive/1/464477/30/0/threaded
Bugtraq: 20070403 Re: APOP vulnerability (Google Search)
http://www.securityfocus.com/archive/1/464569/100/0/threaded
Bugtraq: 20070531 FLEA-2007-0023-1: firefox (Google Search)
http://www.securityfocus.com/archive/1/470172/100/200/threaded
Bugtraq: 20070615 rPSA-2007-0122-1 evolution-data-server (Google Search)
http://www.securityfocus.com/archive/1/471455/100/0/threaded
Bugtraq: 20070619 FLEA-2007-0026-1: evolution-data-server (Google Search)
http://www.securityfocus.com/archive/1/471720/100/0/threaded
Bugtraq: 20070620 FLEA-2007-0027-1: thunderbird (Google Search)
http://www.securityfocus.com/archive/1/471842/100/0/threaded
Cert/CC Advisory: TA07-151A
http://www.us-cert.gov/cas/techalerts/TA07-151A.html
Debian Security Information: DSA-1300 (Google Search)
http://www.debian.org/security/2007/dsa-1300
Debian Security Information: DSA-1305 (Google Search)
http://www.debian.org/security/2007/dsa-1305
http://security.gentoo.org/glsa/glsa-200706-06.xml
HPdes Security Advisory: HPSBUX02153
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00771742
HPdes Security Advisory: HPSBUX02156
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00774579
HPdes Security Advisory: SSRT061181
HPdes Security Advisory: SSRT061236
http://www.mandriva.com/security/advisories?name=MDKSA-2007:105
http://www.mandriva.com/security/advisories?name=MDKSA-2007:107
http://www.mandriva.com/security/advisories?name=MDKSA-2007:113
http://www.mandriva.com/security/advisories?name=MDKSA-2007:119
http://www.mandriva.com/security/advisories?name=MDKSA-2007:131
http://mail.gnome.org/archives/balsa-list/2007-July/msg00000.html
http://www.openwall.com/lists/oss-security/2009/08/15/1
http://www.openwall.com/lists/oss-security/2009/08/18/1
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9782
http://www.redhat.com/support/errata/RHSA-2007-0344.html
http://www.redhat.com/support/errata/RHSA-2007-0353.html
http://www.redhat.com/support/errata/RHSA-2007-0385.html
http://www.redhat.com/support/errata/RHSA-2007-0386.html
http://www.redhat.com/support/errata/RHSA-2007-0401.html
http://www.redhat.com/support/errata/RHSA-2007-0402.html
http://www.redhat.com/support/errata/RHSA-2009-1140.html
http://www.securitytracker.com/id?1018008
http://secunia.com/advisories/25353
http://secunia.com/advisories/25402
http://secunia.com/advisories/25476
http://secunia.com/advisories/25496
http://secunia.com/advisories/25529
http://secunia.com/advisories/25534
http://secunia.com/advisories/25546
http://secunia.com/advisories/25559
http://secunia.com/advisories/25664
http://secunia.com/advisories/25750
http://secunia.com/advisories/25798
http://secunia.com/advisories/25858
http://secunia.com/advisories/25894
http://secunia.com/advisories/26083
http://secunia.com/advisories/26415
http://secunia.com/advisories/35699
SGI Security Advisory: 20070602-01-P
ftp://patches.sgi.com/support/free/security/advisories/20070602-01-P.asc
http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.571857
SuSE Security Announcement: SUSE-SA:2007:036 (Google Search)
http://www.novell.com/linux/security/advisories/2007_36_mozilla.html
SuSE Security Announcement: SUSE-SR:2007:014 (Google Search)
http://www.novell.com/linux/security/advisories/2007_14_sr.html
http://www.trustix.org/errata/2007/0019/
http://www.trustix.org/errata/2007/0024/
http://www.ubuntu.com/usn/usn-469-1
http://www.ubuntu.com/usn/usn-520-1
http://www.vupen.com/english/advisories/2007/1466
http://www.vupen.com/english/advisories/2007/1467
http://www.vupen.com/english/advisories/2007/1468
http://www.vupen.com/english/advisories/2007/1480
http://www.vupen.com/english/advisories/2007/1939
http://www.vupen.com/english/advisories/2007/1994
http://www.vupen.com/english/advisories/2007/2788
http://www.vupen.com/english/advisories/2008/0082
Common Vulnerability Exposure (CVE) ID: CVE-2007-2754
1018088
http://www.securitytracker.com/id?1018088
102967
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102967-1
103171
http://sunsolve.sun.com/search/document.do?assetkey=1-26-103171-1
200033
http://sunsolve.sun.com/search/document.do?assetkey=1-66-200033-1
2007-0019
20070524 FLEA-2007-0020-1: freetype
http://www.securityfocus.com/archive/1/469463/100/200/threaded
20070602-01-P
20070613 FLEA-2007-0025-1: openoffice.org
http://www.securityfocus.com/archive/1/471286/30/6180/threaded
24074
http://www.securityfocus.com/bid/24074
25350
http://secunia.com/advisories/25350
25353
25386
http://secunia.com/advisories/25386
25463
http://secunia.com/advisories/25463
25483
http://secunia.com/advisories/25483
25609
http://secunia.com/advisories/25609
25612
http://secunia.com/advisories/25612
25654
http://secunia.com/advisories/25654
25705
http://secunia.com/advisories/25705
25808
http://secunia.com/advisories/25808
25894
25905
http://secunia.com/advisories/25905
26129
http://secunia.com/advisories/26129
26305
http://secunia.com/advisories/26305
28298
http://secunia.com/advisories/28298
30161
http://secunia.com/advisories/30161
35074
http://secunia.com/advisories/35074
35200
http://secunia.com/advisories/35200
35204
http://secunia.com/advisories/35204
35233
http://secunia.com/advisories/35233
36509
http://osvdb.org/36509
ADV-2007-1894
http://www.vupen.com/english/advisories/2007/1894
ADV-2007-2229
http://www.vupen.com/english/advisories/2007/2229
ADV-2008-0049
http://www.vupen.com/english/advisories/2008/0049
ADV-2009-1297
http://www.vupen.com/english/advisories/2009/1297
APPLE-SA-2007-11-14
http://lists.apple.com/archives/Security-announce/2007/Nov/msg00003.html
APPLE-SA-2009-05-12
http://lists.apple.com/archives/security-announce/2009/May/msg00002.html
DSA-1302
http://www.debian.org/security/2007/dsa-1302
DSA-1334
http://www.debian.org/security/2007/dsa-1334
FEDORA-2009-5558
https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01316.html
FEDORA-2009-5644
https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01401.html
GLSA-200705-22
http://www.gentoo.org/security/en/glsa/glsa-200705-22.xml
GLSA-200707-02
http://www.gentoo.org/security/en/glsa/glsa-200707-02.xml
GLSA-200805-07
http://www.gentoo.org/security/en/glsa/glsa-200805-07.xml
MDKSA-2007:121
http://www.mandriva.com/security/advisories?name=MDKSA-2007:121
OpenPKG-SA-2007.018
http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.018.html
RHSA-2007:0403
http://www.redhat.com/support/errata/RHSA-2007-0403.html
RHSA-2009:0329
http://www.redhat.com/support/errata/RHSA-2009-0329.html
RHSA-2009:1062
http://www.redhat.com/support/errata/RHSA-2009-1062.html
SUSE-SA:2007:041
http://www.novell.com/linux/security/advisories/2007_41_freetype2.html
TA09-133A
http://www.us-cert.gov/cas/techalerts/TA09-133A.html
USN-466-1
http://www.ubuntu.com/usn/usn-466-1
[ft-devel] 20070427 Bug in fuzzed TTF file
http://lists.gnu.org/archive/html/freetype-devel/2007-04/msg00041.html
http://cvs.savannah.nongnu.org/viewvc/freetype2/src/truetype/ttgload.c?root=freetype&r1=1.177&r2=1.178
http://support.apple.com/kb/HT3549
http://support.avaya.com/elmodocs2/security/ASA-2007-330.htm
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=240200
https://bugzilla.redhat.com/show_bug.cgi?id=502565
https://issues.rpath.com/browse/RPL-1390
oval:org.mitre.oval:def:11325
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11325
oval:org.mitre.oval:def:5532
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5532
Common Vulnerability Exposure (CVE) ID: CVE-2007-2756
BugTraq ID: 24089
http://www.securityfocus.com/bid/24089
https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00397.html
https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00354.html
http://security.gentoo.org/glsa/glsa-200708-05.xml
http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml
http://security.gentoo.org/glsa/glsa-200711-34.xml
http://security.gentoo.org/glsa/glsa-200805-13.xml
HPdes Security Advisory: HPSBUX02262
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795
HPdes Security Advisory: SSRT071447
http://www.mandriva.com/security/advisories?name=MDKSA-2007:122
http://www.mandriva.com/security/advisories?name=MDKSA-2007:123
http://www.mandriva.com/security/advisories?name=MDKSA-2007:124
http://www.mandriva.com/security/advisories?name=MDKSA-2007:187
http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.020.html
http://osvdb.org/35788
http://osvdb.org/36643
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10779
RedHat Security Advisories: RHSA-2007:0889
http://rhn.redhat.com/errata/RHSA-2007-0889.html
http://www.redhat.com/support/errata/RHSA-2007-0890.html
http://www.redhat.com/support/errata/RHSA-2007-0891.html
http://www.redhat.com/support/errata/RHSA-2008-0146.html
http://www.securitytracker.com/id?1018187
http://secunia.com/advisories/25362
http://secunia.com/advisories/25378
http://secunia.com/advisories/25535
http://secunia.com/advisories/25575
http://secunia.com/advisories/25590
http://secunia.com/advisories/25646
http://secunia.com/advisories/25657
http://secunia.com/advisories/25658
http://secunia.com/advisories/25787
http://secunia.com/advisories/25855
http://secunia.com/advisories/26048
http://secunia.com/advisories/26231
http://secunia.com/advisories/26390
http://secunia.com/advisories/26871
http://secunia.com/advisories/26895
http://secunia.com/advisories/26930
http://secunia.com/advisories/26967
http://secunia.com/advisories/27037
http://secunia.com/advisories/27102
http://secunia.com/advisories/27110
http://secunia.com/advisories/27545
http://secunia.com/advisories/29157
http://secunia.com/advisories/30168
http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.482863
SuSE Security Announcement: SUSE-SA:2007:044 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2007-07/msg00006.html
SuSE Security Announcement: SUSE-SR:2007:013 (Google Search)
http://www.novell.com/linux/security/advisories/2007_13_sr.html
http://www.trustix.org/errata/2007/0023/
http://www.ubuntu.com/usn/usn-473-1
http://www.vupen.com/english/advisories/2007/1904
http://www.vupen.com/english/advisories/2007/1905
http://www.vupen.com/english/advisories/2007/2016
http://www.vupen.com/english/advisories/2007/2336
http://www.vupen.com/english/advisories/2007/3386
XForce ISS Database: gd-gdpngreaddata-dos(34420)
https://exchange.xforce.ibmcloud.com/vulnerabilities/34420
Common Vulnerability Exposure (CVE) ID: CVE-2007-2445
http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html
BugTraq ID: 24000
http://www.securityfocus.com/bid/24000
BugTraq ID: 24023
http://www.securityfocus.com/bid/24023
Bugtraq: 20070517 FLEA-2007-0018-1: libpng (Google Search)
http://www.securityfocus.com/archive/1/468910/100/0/threaded
Bugtraq: 20080304 CORE-2008-0124: Multiple vulnerabilities in Google's Android SDK (Google Search)
http://www.securityfocus.com/archive/1/489135/100/0/threaded
CERT/CC vulnerability note: VU#684664
http://www.kb.cert.org/vuls/id/684664
Debian Security Information: DSA-1613 (Google Search)
http://www.debian.org/security/2008/dsa-1613
Debian Security Information: DSA-1750 (Google Search)
http://www.debian.org/security/2009/dsa-1750
http://www.gentoo.org/security/en/glsa/glsa-200705-24.xml
http://www.mandriva.com/security/advisories?name=MDKSA-2007:116
http://www.coresecurity.com/?action=item&id=2148
http://openpkg.com/go/OpenPKG-SA-2007.013
http://osvdb.org/36196
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10094
http://www.redhat.com/support/errata/RHSA-2007-0356.html
http://www.securitytracker.com/id?1018078
http://secunia.com/advisories/25268
http://secunia.com/advisories/25273
http://secunia.com/advisories/25292
http://secunia.com/advisories/25329
http://secunia.com/advisories/25461
http://secunia.com/advisories/25554
http://secunia.com/advisories/25571
http://secunia.com/advisories/25742
http://secunia.com/advisories/25867
http://secunia.com/advisories/27056
http://secunia.com/advisories/29420
http://secunia.com/advisories/31168
http://secunia.com/advisories/34388
http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.492650
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102987-1
http://sunsolve.sun.com/search/document.do?assetkey=1-66-200871-1
http://www.ubuntu.com/usn/usn-472-1
http://www.vupen.com/english/advisories/2007/1838
http://www.vupen.com/english/advisories/2007/2385
http://www.vupen.com/english/advisories/2008/0924/references
XForce ISS Database: libpng-trns-chunk-dos(34340)
https://exchange.xforce.ibmcloud.com/vulnerabilities/34340
Common Vulnerability Exposure (CVE) ID: CVE-2007-2052
BugTraq ID: 23887
http://www.securityfocus.com/bid/23887
Bugtraq: 20070521 FLEA-2007-0019-1: python (Google Search)
http://www.securityfocus.com/archive/1/469294/30/6450/threaded
Bugtraq: 20080221 VMSA-2008-0003 Moderate: Updated aacraid driver and samba and python service console updates (Google Search)
http://www.securityfocus.com/archive/1/488457/100/0/threaded
Bugtraq: 20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components (Google Search)
http://www.securityfocus.com/archive/1/507985/100/0/threaded
Debian Security Information: DSA-1551 (Google Search)
http://www.debian.org/security/2008/dsa-1551
Debian Security Information: DSA-1620 (Google Search)
http://www.debian.org/security/2008/dsa-1620
http://www.mandriva.com/security/advisories?name=MDKSA-2007:099
http://lists.vmware.com/pipermail/security-announce/2008/000005.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11716
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8353
http://www.redhat.com/support/errata/RHSA-2007-1076.html
http://www.redhat.com/support/errata/RHSA-2007-1077.html
http://www.redhat.com/support/errata/RHSA-2008-0629.html
http://secunia.com/advisories/25190
http://secunia.com/advisories/25217
http://secunia.com/advisories/25233
http://secunia.com/advisories/28027
http://secunia.com/advisories/28050
http://secunia.com/advisories/29032
http://secunia.com/advisories/29303
http://secunia.com/advisories/29889
http://secunia.com/advisories/31255
http://secunia.com/advisories/31492
http://secunia.com/advisories/37471
http://www.ubuntu.com/usn/usn-585-1
http://www.vupen.com/english/advisories/2007/1465
http://www.vupen.com/english/advisories/2008/0637
http://www.vupen.com/english/advisories/2009/3316
XForce ISS Database: python-localemodule-information-disclosure(34060)
https://exchange.xforce.ibmcloud.com/vulnerabilities/34060
CopyrightCopyright (c) 2007 E-Soft Inc. http://www.securityspace.com

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.