English | Deutsch | Español | Português
 UserID:
 Passwd:
new user
 About:   Dedicated  | Advanced  | Standard  | Recurring  | No Risk  | Desktop  | Basic  | Single  | Security Seal  | FAQ
  Price/Feature Summary  | Order  | New Vulnerabilities  | Confidentiality  | Vulnerability Search
 Vulnerability   
Search   
    Search 73247 CVE descriptions
and 39212 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.59660
Category:Trustix Local Security Checks
Title:Trustix Security Advisory TSLSA-2007-0026 (Multiple packages)
Summary:Trustix Security Advisory TSLSA-2007-0026 (Multiple packages)
Description:
The remote host is missing updates announced in
advisory TSLSA-2007-0026.

These include apache, clamav, kerberos5, php, rsync, tar, vim

For details on the issues addressed in these updates,
please visit the referenced security advisories.

The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the name CVE-2007-2953 to this issue.

Solution:
Update your system with the packages as indicated in
the referenced security advisory.

http://www.securityspace.com/smysecure/catid.html?in=TSLSA-2007-0026

Risk factor : Critical
Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2006-5752
Bugtraq: 20090821 VMSA-2009-0010 VMware Hosted products update libpng and Apache HTTP Server (Google Search)
http://www.securityfocus.com/archive/1/archive/1/505990/100/0/threaded
http://lists.vmware.com/pipermail/security-announce/2009/000062.html
http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=245112
AIX APAR: PK49295
http://www-1.ibm.com/support/search.wss?rs=0&q=PK49295&apar=only
AIX APAR: PK52702
http://www-1.ibm.com/support/docview.wss?uid=swg1PK52702
http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00320.html
http://security.gentoo.org/glsa/glsa-200711-06.xml
HPdes Security Advisory: HPSBUX02262
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795
HPdes Security Advisory: SSRT071447
http://www.mandriva.com/security/advisories?name=MDKSA-2007:140
http://www.mandriva.com/security/advisories?name=MDKSA-2007:141
http://www.mandriva.com/security/advisories?name=MDKSA-2007:142
RedHat Security Advisories: RHSA-2007:0532
RedHat Security Advisories: RHSA-2007:0534
http://rhn.redhat.com/errata/RHSA-2007-0534.html
RedHat Security Advisories: RHSA-2007:0556
http://rhn.redhat.com/errata/RHSA-2007-0556.html
RedHat Security Advisories: RHSA-2007:0533
https://rhn.redhat.com/errata/RHSA-2007-0533.html
http://www.redhat.com/support/errata/RHSA-2007-0557.html
http://www.redhat.com/support/errata/RHSA-2008-0261.html
http://sunsolve.sun.com/search/document.do?assetkey=1-26-103179-1
http://sunsolve.sun.com/search/document.do?assetkey=1-66-200032-1
SuSE Security Announcement: SUSE-SA:2007:061 (Google Search)
http://www.novell.com/linux/security/advisories/2007_61_apache2.html
http://www.trustix.org/errata/2007/0026/
http://www.ubuntu.com/usn/usn-499-1
BugTraq ID: 24645
http://www.securityfocus.com/bid/24645
http://osvdb.org/37052
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10154
http://secunia.com/advisories/28606
http://www.vupen.com/english/advisories/2007/2727
http://www.vupen.com/english/advisories/2007/3283
http://www.vupen.com/english/advisories/2007/3386
http://www.vupen.com/english/advisories/2007/4305
http://www.securitytracker.com/id?1018302
http://secunia.com/advisories/25827
http://secunia.com/advisories/25830
http://secunia.com/advisories/25873
http://secunia.com/advisories/25920
http://secunia.com/advisories/26273
http://secunia.com/advisories/26443
http://secunia.com/advisories/26458
http://secunia.com/advisories/26508
http://secunia.com/advisories/26822
http://secunia.com/advisories/26842
http://secunia.com/advisories/26993
http://secunia.com/advisories/27037
http://secunia.com/advisories/27563
http://secunia.com/advisories/27732
http://secunia.com/advisories/28212
http://secunia.com/advisories/28224
http://www.vupen.com/english/advisories/2008/0233
XForce ISS Database: apache-modstatus-xss(35097)
http://xforce.iss.net/xforce/xfdb/35097
Common Vulnerability Exposure (CVE) ID: CVE-2007-3304
Bugtraq: 20070529 Apache httpd vulenrabilities (Google Search)
http://www.securityfocus.com/archive/1/archive/1/469899/100/0/threaded
Bugtraq: 20070619 Apache Prefork MPM vulnerabilities - Report (Google Search)
http://www.securityfocus.com/archive/1/archive/1/471832/100/0/threaded
http://marc.info/?l=apache-httpd-dev&m=118252946632447&w=2
http://mail-archives.apache.org/mod_mbox/httpd-dev/200706.mbox/%3c20070629141032.GA15192@redhat.com%3e
http://security.psnc.pl/files/apache_report.pdf
http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=245111
AIX APAR: PK50467
http://www-1.ibm.com/support/search.wss?rs=0&q=PK50467&apar=only
AIX APAR: PK53984
http://www-1.ibm.com/support/docview.wss?uid=swg1PK53984
HPdes Security Advisory: HPSBUX02273
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01182588
HPdes Security Advisory: SSRT071476
http://www.redhat.com/errata/RHSA-2007-0532.html
http://www.redhat.com/support/errata/RHSA-2007-0662.html
SGI Security Advisory: 20070701-01-P
ftp://patches.sgi.com/support/free/security/advisories/20070701-01-P.asc
BugTraq ID: 24215
http://www.securityfocus.com/bid/24215
http://osvdb.org/38939
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11589
http://www.vupen.com/english/advisories/2007/3100
http://www.vupen.com/english/advisories/2007/3420
http://www.vupen.com/english/advisories/2007/3494
http://www.securitytracker.com/id?1018304
http://secunia.com/advisories/26211
http://secunia.com/advisories/26611
http://secunia.com/advisories/26759
http://secunia.com/advisories/26790
http://secunia.com/advisories/27121
http://secunia.com/advisories/27209
http://securityreason.com/securityalert/2814
XForce ISS Database: apache-child-process-dos(35095)
http://xforce.iss.net/xforce/xfdb/35095
Common Vulnerability Exposure (CVE) ID: CVE-2007-1863
http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=244658
AIX APAR: PK49355
http://www-1.ibm.com/support/docview.wss?uid=swg1PK49355
http://lists.apple.com/archives/security-announce/2008//May/msg00001.html
Cert/CC Advisory: TA08-150A
http://www.us-cert.gov/cas/techalerts/TA08-150A.html
BugTraq ID: 24649
http://www.securityfocus.com/bid/24649
http://osvdb.org/37079
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9824
http://www.vupen.com/english/advisories/2008/1697
http://www.securitytracker.com/id?1018303
http://secunia.com/advisories/30430
Common Vulnerability Exposure (CVE) ID: CVE-2007-4510
http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html
Debian Security Information: DSA-1366 (Google Search)
http://www.debian.org/security/2007/dsa-1366
https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00104.html
http://security.gentoo.org/glsa/glsa-200709-14.xml
http://www.mandriva.com/security/advisories?name=MDKSA-2007:172
SuSE Security Announcement: SUSE-SR:2007:018 (Google Search)
http://www.novell.com/linux/security/advisories/2007_18_sr.html
BugTraq ID: 25398
http://www.securityfocus.com/bid/25398
http://www.vupen.com/english/advisories/2007/2952
http://www.vupen.com/english/advisories/2008/0924/references
http://secunia.com/advisories/26530
http://secunia.com/advisories/26552
http://secunia.com/advisories/26674
http://secunia.com/advisories/26654
http://secunia.com/advisories/26683
http://secunia.com/advisories/26751
http://secunia.com/advisories/26916
http://secunia.com/advisories/29420
http://securityreason.com/securityalert/3054
XForce ISS Database: clamav-clihtmlnormalise-dos(36177)
http://xforce.iss.net/xforce/xfdb/36177
XForce ISS Database: clamav-rtf-dos(36173)
http://xforce.iss.net/xforce/xfdb/36173
Common Vulnerability Exposure (CVE) ID: CVE-2007-4560
Bugtraq: 20070824 n.runs-SA-2007.025 - ClamAV Remote Code Execution Advisory (Google Search)
http://www.securityfocus.com/archive/1/archive/1/477723/100/0/threaded
http://www.nruns.com/security_advisory_clamav_remote_code_exection.php
BugTraq ID: 25439
http://www.securityfocus.com/bid/25439
http://www.securitytracker.com/id?1018610
http://securityreason.com/securityalert/3063
Common Vulnerability Exposure (CVE) ID: CVE-2007-3999
Bugtraq: 20070906 rPSA-2007-0179-1 krb5 krb5-server krb5-services krb5-test krb5-workstation (Google Search)
http://www.securityfocus.com/archive/1/archive/1/478748/100/0/threaded
Bugtraq: 20070912 ZDI-07-052: Multiple Kerberos Implementations Authentication Context Stack Overflow Vulnerability (Google Search)
http://www.securityfocus.com/archive/1/archive/1/479251/100/0/threaded
http://lists.rpath.com/pipermail/security-announce/2007-September/000237.html
https://bugzilla.redhat.com/show_bug.cgi?id=250973
http://www.zerodayinitiative.com/advisories/ZDI-07-052.html
http://lists.apple.com/archives/security-announce/2007/Nov/msg00002.html
Debian Security Information: DSA-1367 (Google Search)
http://www.debian.org/security/2007/dsa-1367
Debian Security Information: DSA-1368 (Google Search)
http://www.debian.org/security/2007/dsa-1368
https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00087.html
https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00173.html
http://www.gentoo.org/security/en/glsa/glsa-200709-01.xml
http://security.gentoo.org/glsa/glsa-200710-01.xml
http://www.mandriva.com/security/advisories?name=MDKSA-2007:174
http://www.mandriva.com/security/advisories?name=MDKSA-2007:181
http://www.redhat.com/support/errata/RHSA-2007-0858.html
http://www.redhat.com/support/errata/RHSA-2007-0913.html
http://www.redhat.com/support/errata/RHSA-2007-0951.html
http://sunsolve.sun.com/search/document.do?assetkey=1-26-103060-1
http://sunsolve.sun.com/search/document.do?assetkey=1-66-201319-1
SuSE Security Announcement: SUSE-SR:2007:019 (Google Search)
http://www.novell.com/linux/security/advisories/2007_19_sr.html
SuSE Security Announcement: SUSE-SR:2007:024 (Google Search)
http://www.novell.com/linux/security/advisories/2007_24_sr.html
http://www.ubuntu.com/usn/usn-511-1
Cert/CC Advisory: TA07-319A
http://www.us-cert.gov/cas/techalerts/TA07-319A.html
CERT/CC vulnerability note: VU#883632
http://www.kb.cert.org/vuls/id/883632
BugTraq ID: 25534
http://www.securityfocus.com/bid/25534
BugTraq ID: 26444
http://www.securityfocus.com/bid/26444
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9379
http://www.vupen.com/english/advisories/2007/3051
http://www.vupen.com/english/advisories/2007/3052
http://www.vupen.com/english/advisories/2007/3060
http://www.vupen.com/english/advisories/2007/3868
http://www.vupen.com/english/advisories/2008/0803/references
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:3162
http://www.securitytracker.com/id?1018647
http://secunia.com/advisories/26680
http://secunia.com/advisories/26699
http://secunia.com/advisories/26728
http://secunia.com/advisories/26676
http://secunia.com/advisories/26684
http://secunia.com/advisories/26691
http://secunia.com/advisories/26700
http://secunia.com/advisories/26705
http://secunia.com/advisories/26792
http://secunia.com/advisories/26783
http://secunia.com/advisories/26896
http://secunia.com/advisories/26697
http://secunia.com/advisories/27043
http://secunia.com/advisories/27081
http://secunia.com/advisories/26987
http://secunia.com/advisories/26713
http://secunia.com/advisories/27146
http://secunia.com/advisories/27643
http://secunia.com/advisories/27756
http://secunia.com/advisories/29247
http://secunia.com/advisories/29270
http://securityreason.com/securityalert/3092
XForce ISS Database: kerberos-rpcsecgss-bo(36437)
http://xforce.iss.net/xforce/xfdb/36437
Common Vulnerability Exposure (CVE) ID: CVE-2007-3996
http://secweb.se/en/advisories/php-imagecopyresized-integer-overflow/
http://secweb.se/en/advisories/php-imagecreatetruecolor-integer-overflow/
Debian Security Information: DSA-1613 (Google Search)
http://www.debian.org/security/2008/dsa-1613
https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00354.html
http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml
http://security.gentoo.org/glsa/glsa-200712-13.xml
http://www.mandriva.com/security/advisories?name=MDKSA-2007:187
http://www.redhat.com/support/errata/RHSA-2007-0890.html
RedHat Security Advisories: RHSA-2007:0889
http://rhn.redhat.com/errata/RHSA-2007-0889.html
http://www.redhat.com/support/errata/RHSA-2007-0888.html
http://www.redhat.com/support/errata/RHSA-2007-0891.html
SuSE Security Announcement: SUSE-SA:2008:004 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-01/msg00006.html
http://www.ubuntu.com/usn/usn-557-1
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11147
http://www.vupen.com/english/advisories/2007/3023
http://secunia.com/advisories/26642
http://secunia.com/advisories/26838
http://secunia.com/advisories/26930
http://secunia.com/advisories/26871
http://secunia.com/advisories/26895
http://secunia.com/advisories/26967
http://secunia.com/advisories/27351
http://secunia.com/advisories/27377
http://secunia.com/advisories/27545
http://secunia.com/advisories/27102
http://secunia.com/advisories/28009
http://secunia.com/advisories/28147
http://secunia.com/advisories/28658
http://secunia.com/advisories/31168
http://securityreason.com/securityalert/3103
XForce ISS Database: php-gdimagecopyresized-bo(36383)
http://xforce.iss.net/xforce/xfdb/36383
XForce ISS Database: php-gdimagecreate-bo(36382)
http://xforce.iss.net/xforce/xfdb/36382
Common Vulnerability Exposure (CVE) ID: CVE-2007-3378
Bugtraq: 20070627 PHP 4/5 htaccess safemode and open_basedir Bypass (Google Search)
http://www.securityfocus.com/archive/1/archive/1/472343/100/0/threaded
http://securityreason.com/achievement_exploitalert/9
http://securityreason.com/achievement_securityalert/45
HPdes Security Advisory: HPSBUX02308
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01345501
HPdes Security Advisory: SSRT080010
HPdes Security Advisory: HPSBUX02332
http://www.securityfocus.com/archive/1/archive/1/491693/100/0/threaded
HPdes Security Advisory: SSRT080056
http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.335136
BugTraq ID: 24661
http://www.securityfocus.com/bid/24661
BugTraq ID: 25498
http://www.securityfocus.com/bid/25498
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6056
http://www.vupen.com/english/advisories/2008/0398
http://www.osvdb.org/38682
http://secunia.com/advisories/27648
http://secunia.com/advisories/28318
http://secunia.com/advisories/28750
http://secunia.com/advisories/28936
http://secunia.com/advisories/30040
http://securityreason.com/securityalert/2831
http://securityreason.com/securityalert/3389
http://www.vupen.com/english/advisories/2008/0059
XForce ISS Database: php-htaccess-security-bypass(35102)
http://xforce.iss.net/xforce/xfdb/35102
XForce ISS Database: php-sessionsavepath-errorlog-security-bypass(39403)
http://xforce.iss.net/xforce/xfdb/39403
Common Vulnerability Exposure (CVE) ID: CVE-2007-3997
http://www.milw0rm.com/exploits/4392
http://secweb.se/en/advisories/php-mysql-safe-mode-bypass-vulnerability/
http://securityreason.com/securityalert/3102
XForce ISS Database: php-local-infile-security-bypass(36384)
http://xforce.iss.net/xforce/xfdb/36384
XForce ISS Database: php-localinfile-mysql-security-bypass(39402)
http://xforce.iss.net/xforce/xfdb/39402
Common Vulnerability Exposure (CVE) ID: CVE-2007-4091
Bugtraq: 20070823 FLEA-2007-0047-1 rsync (Google Search)
http://www.securityfocus.com/archive/1/archive/1/477628/100/0/threaded
Debian Security Information: DSA-1360 (Google Search)
http://www.debian.org/security/2007/dsa-1360
http://security.gentoo.org/glsa/glsa-200709-13.xml
http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.481089
SuSE Security Announcement: SUSE-SR:2007:017 (Google Search)
http://www.novell.com/linux/security/advisories/2007_17_sr.html
http://www.ubuntu.com/usn/usn-500-1
BugTraq ID: 25336
http://www.securityfocus.com/bid/25336
http://www.vupen.com/english/advisories/2007/2915
http://secunia.com/advisories/26493
http://secunia.com/advisories/26518
http://secunia.com/advisories/26537
http://secunia.com/advisories/26548
http://secunia.com/advisories/26634
http://secunia.com/advisories/26543
http://secunia.com/advisories/26911
http://secunia.com/advisories/27896
XForce ISS Database: rsync-fname-bo(36072)
http://xforce.iss.net/xforce/xfdb/36072
Common Vulnerability Exposure (CVE) ID: CVE-2007-4131
Bugtraq: 20070825 rPSA-2007-0172-1 tar (Google Search)
http://www.securityfocus.com/archive/1/archive/1/477731/100/0/threaded
Bugtraq: 20070827 FLEA-2007-0049-1 tar (Google Search)
http://www.securityfocus.com/archive/1/archive/1/477865/100/0/threaded
http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=251921
http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html
Debian Security Information: DSA-1438 (Google Search)
http://www.debian.org/security/2007/dsa-1438
https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00370.html
FreeBSD Security Advisory: FreeBSD-SA-07:10
http://security.FreeBSD.org/advisories/FreeBSD-SA-07:10.gtar.asc
http://security.gentoo.org/glsa/glsa-200709-09.xml
http://www.mandriva.com/security/advisories?name=MDKSA-2007:173
http://www.redhat.com/support/errata/RHSA-2007-0860.html
http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021680.1-1
http://www.ubuntu.com/usn/usn-506-1
Cert/CC Advisory: TA07-352A
http://www.us-cert.gov/cas/techalerts/TA07-352A.html
BugTraq ID: 25417
http://www.securityfocus.com/bid/25417
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10420
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:7779
http://www.vupen.com/english/advisories/2007/2958
http://www.vupen.com/english/advisories/2007/4238
http://www.securitytracker.com/id?1018599
http://secunia.com/advisories/26573
http://secunia.com/advisories/26590
http://secunia.com/advisories/26604
http://secunia.com/advisories/26603
http://secunia.com/advisories/26673
http://secunia.com/advisories/26655
http://secunia.com/advisories/26781
http://secunia.com/advisories/26984
http://secunia.com/advisories/27453
http://secunia.com/advisories/27861
http://secunia.com/advisories/28136
http://secunia.com/advisories/28255
Common Vulnerability Exposure (CVE) ID: CVE-2007-2953
Bugtraq: 20070730 FLEA-2007-0036-1 vim vim-minimal gvim (Google Search)
http://www.securityfocus.com/archive/1/archive/1/475076/100/100/threaded
Bugtraq: 20090401 VMSA-2009-0004 ESX Service Console updates for openssl, bind, and vim (Google Search)
http://www.securityfocus.com/archive/1/archive/1/502322/100/0/threaded
http://secunia.com/secunia_research/2007-66/advisory/
Debian Security Information: DSA-1364 (Google Search)
http://www.debian.org/security/2007/dsa-1364
http://www.mandriva.com/security/advisories?name=MDKSA-2007:168
http://www.mandriva.com/security/advisories?name=MDVSA-2008:236
http://www.redhat.com/support/errata/RHSA-2008-0617.html
http://www.redhat.com/support/errata/RHSA-2008-0580.html
http://www.ubuntu.com/usn/usn-505-1
http://www.attrition.org/pipermail/vim/2007-August/001770.html
BugTraq ID: 25095
http://www.securityfocus.com/bid/25095
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11549
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6463
http://secunia.com/advisories/32858
http://www.vupen.com/english/advisories/2007/2687
http://www.vupen.com/english/advisories/2009/0033
http://secunia.com/advisories/25941
http://secunia.com/advisories/26285
http://secunia.com/advisories/26594
http://secunia.com/advisories/26653
http://secunia.com/advisories/26522
http://secunia.com/advisories/33410
http://www.vupen.com/english/advisories/2009/0904
XForce ISS Database: vim-helptagsone-code-execution(35655)
http://xforce.iss.net/xforce/xfdb/35655
CopyrightCopyright (c) 2007 E-Soft Inc. http://www.securityspace.com

This is only one of 39212 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

New User Registration
Email:
UserID:
Passwd:
Please email me your monthly newsletters, informing the latest services, improvements & surveys.
Please email me a vulnerability test announcement whenever a new test is added.
   Privacy
Registered User Login
 
UserID:   
Passwd:  

 Forgot userid or passwd?
Email/Userid:




Home | About Us | Contact Us | Partner Programs | Privacy | Mailing Lists | Abuse
Security Audits | Managed DNS | Network Monitoring | Site Analyzer | Internet Research Reports
Web Probe | Whois

© 1998-2014 E-Soft Inc. All rights reserved.