English | Deutsch | Español | Português
 UserID:
 Passwd:
new user
 About:   Dedicated  | Advanced  | Standard  | Recurring  | No Risk  | Desktop  | Basic  | Single  | Security Seal  | FAQ
  Price/Feature Summary  | Order  | New Vulnerabilities  | Confidentiality  | Vulnerability Search
 Vulnerability   
Search   
    Search 75516 CVE descriptions
and 39786 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.63187
Category:SuSE Local Security Checks
Title:SuSE Security Summary SUSE-SR:2009:001 (OpenSuSE 11.0)
Summary:SuSE Security Advisory SUSE-SR:2009:001 (OpenSuSE 11.0)
Description:The remote host is missing updates announced in
advisory SUSE-SR:2009:001. SuSE Security Summaries are short
on detail when it comes to the names of packages affected by
a particular bug. Because of this, while this test will detect
out of date packages, it cannot tell you what bugs impact
which packages, or vice versa.

Solution:

Update all out of date packages.
Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2008-2380
http://security.gentoo.org/glsa/glsa-200903-25.xml
BugTraq ID: 32926
http://www.securityfocus.com/bid/32926
http://osvdb.org/50811
http://secunia.com/advisories/33235
http://secunia.com/advisories/34234
XForce ISS Database: courier-library-postgres-sql-injection(47494)
http://xforce.iss.net/xforce/xfdb/47494
Common Vulnerability Exposure (CVE) ID: CVE-2008-3933
Bugtraq: 20080917 rPSA-2008-0278-1 tshark wireshark (Google Search)
http://www.securityfocus.com/archive/1/archive/1/496487/100/0/threaded
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=2682
Debian Security Information: DSA-1673 (Google Search)
http://www.debian.org/security/2008/dsa-1673
https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00715.html
https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00713.html
http://security.gentoo.org/glsa/glsa-200809-17.xml
http://www.mandriva.com/security/advisories?name=MDVSA-2008:199
http://www.redhat.com/support/errata/RHSA-2008-0890.html
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9620
http://www.vupen.com/english/advisories/2008/2773
http://www.securitytracker.com/id?1020819
http://secunia.com/advisories/31886
http://secunia.com/advisories/32028
http://secunia.com/advisories/31864
http://secunia.com/advisories/32091
http://secunia.com/advisories/32944
http://www.vupen.com/english/advisories/2008/2493
Common Vulnerability Exposure (CVE) ID: CVE-2008-3934
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9920
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:15087
Common Vulnerability Exposure (CVE) ID: CVE-2008-3963
http://www.openwall.com/lists/oss-security/2008/09/09/4
http://www.openwall.com/lists/oss-security/2008/09/09/7
Debian Security Information: DSA-1783 (Google Search)
http://www.debian.org/security/2009/dsa-1783
http://www.mandriva.com/security/advisories?name=MDVSA-2009:094
http://www.redhat.com/support/errata/RHSA-2009-1067.html
http://www.redhat.com/support/errata/RHSA-2009-1289.html
SuSE Security Announcement: SUSE-SR:2008:025 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00001.html
http://www.ubuntu.com/usn/USN-671-1
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10521
http://secunia.com/advisories/34907
http://secunia.com/advisories/32769
http://secunia.com/advisories/36566
http://www.vupen.com/english/advisories/2008/2554
http://www.securitytracker.com/id?1020858
http://secunia.com/advisories/31769
http://secunia.com/advisories/32759
XForce ISS Database: mysql-bitstring-dos(45042)
http://xforce.iss.net/xforce/xfdb/45042
Common Vulnerability Exposure (CVE) ID: CVE-2008-4097
http://www.openwall.com/lists/oss-security/2008/09/09/20
http://www.openwall.com/lists/oss-security/2008/09/16/3
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=480292#25
XForce ISS Database: mysql-myisam-symlinks-security-bypass(45648)
http://xforce.iss.net/xforce/xfdb/45648
Common Vulnerability Exposure (CVE) ID: CVE-2008-4098
Debian Security Information: DSA-1662 (Google Search)
http://www.debian.org/security/2008/dsa-1662
http://www.redhat.com/support/errata/RHSA-2010-0110.html
http://ubuntu.com/usn/usn-897-1
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10591
http://secunia.com/advisories/38517
http://secunia.com/advisories/32578
XForce ISS Database: mysql-myisam-symlink-security-bypass(45649)
http://xforce.iss.net/xforce/xfdb/45649
Common Vulnerability Exposure (CVE) ID: CVE-2008-4225
http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html
http://lists.apple.com/archives/security-announce/2009/Jun/msg00005.html
Debian Security Information: DSA-1666 (Google Search)
http://www.debian.org/security/2008/dsa-1666
https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00472.html
https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00513.html
http://security.gentoo.org/glsa/glsa-200812-06.xml
http://www.mandriva.com/security/advisories?name=MDVSA-2008:231
http://www.redhat.com/support/errata/RHSA-2008-0988.html
http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.473974
http://sunsolve.sun.com/search/document.do?assetkey=1-26-251406-1
http://sunsolve.sun.com/search/document.do?assetkey=1-66-261688-1
http://sunsolve.sun.com/search/document.do?assetkey=1-66-265329-1
http://www.ubuntu.com/usn/usn-673-1
BugTraq ID: 32331
http://www.securityfocus.com/bid/32331
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6234
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10025
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6415
http://secunia.com/advisories/33746
http://secunia.com/advisories/34247
http://secunia.com/advisories/35379
http://secunia.com/advisories/36173
http://secunia.com/advisories/36235
http://www.vupen.com/english/advisories/2008/3176
http://www.vupen.com/english/advisories/2009/0301
http://www.vupen.com/english/advisories/2009/0034
http://www.vupen.com/english/advisories/2009/0323
http://www.osvdb.org/49992
http://securitytracker.com/id?1021239
http://secunia.com/advisories/32762
http://secunia.com/advisories/32764
http://secunia.com/advisories/32766
http://secunia.com/advisories/32773
http://secunia.com/advisories/32802
http://secunia.com/advisories/32807
http://secunia.com/advisories/32811
http://secunia.com/advisories/33417
http://secunia.com/advisories/32974
http://secunia.com/advisories/33792
http://www.vupen.com/english/advisories/2009/1522
http://www.vupen.com/english/advisories/2009/1621
Common Vulnerability Exposure (CVE) ID: CVE-2008-4314
http://www.redhat.com/archives/fedora-package-announce/2008-December/msg00021.html
http://www.redhat.com/archives/fedora-package-announce/2008-December/msg00141.html
HPdes Security Advisory: HPSBTU02454
http://marc.info/?l=bugtraq&m=125003356619515&w=2
HPdes Security Advisory: SSRT080172
http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.453684
http://sunsolve.sun.com/search/document.do?assetkey=1-26-249087-1
SuSE Security Announcement: SUSE-SR:2008:027 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00002.html
http://www.ubuntu.com/usn/USN-680-1
BugTraq ID: 32494
http://www.securityfocus.com/bid/32494
http://secunia.com/advisories/36281
http://www.vupen.com/english/advisories/2008/3277
http://www.vupen.com/english/advisories/2009/0067
http://osvdb.org/50230
http://www.securitytracker.com/id?1021287
http://secunia.com/advisories/32813
http://secunia.com/advisories/32919
http://secunia.com/advisories/32951
http://secunia.com/advisories/32968
http://www.vupen.com/english/advisories/2009/2245
Common Vulnerability Exposure (CVE) ID: CVE-2008-4552
Bugtraq: 20081030 rPSA-2008-0307-1 nfs-client nfs-server nfs-utils (Google Search)
http://www.securityfocus.com/archive/1/archive/1/497935/100/0/threaded
http://lists.vmware.com/pipermail/security-announce/2010/000082.html
http://www.openwall.com/lists/oss-security/2012/07/19/2
http://www.openwall.com/lists/oss-security/2012/07/19/5
https://bugzilla.redhat.com/show_bug.cgi?id=458676
http://www.mandriva.com/security/advisories?name=MDVSA-2009:060
http://www.redhat.com/support/errata/RHSA-2009-1321.html
http://www.ubuntu.com/usn/USN-687-1
BugTraq ID: 31823
http://www.securityfocus.com/bid/31823
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11544
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:8325
http://secunia.com/advisories/32346
http://secunia.com/advisories/32481
http://secunia.com/advisories/33006
http://secunia.com/advisories/38794
http://secunia.com/advisories/38833
http://secunia.com/advisories/36538
http://www.vupen.com/english/advisories/2010/0528
XForce ISS Database: nfsutils-hostctl-security-bypass(45895)
http://xforce.iss.net/xforce/xfdb/45895
Common Vulnerability Exposure (CVE) ID: CVE-2008-4575
http://www.openwall.com/lists/oss-security/2008/10/15/6
https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00511.html
https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00531.html
BugTraq ID: 31770
http://www.securityfocus.com/bid/31770
http://secunia.com/advisories/32363
Common Vulnerability Exposure (CVE) ID: CVE-2008-4639
http://www.openwall.com/lists/oss-security/2008/10/15/5
http://www.openwall.com/lists/oss-security/2008/10/16/3
http://www.openwall.com/lists/oss-security/2009/02/06/5
Common Vulnerability Exposure (CVE) ID: CVE-2008-4640
http://www.openwall.com/lists/oss-security/2008/11/26/4
BugTraq ID: 32506
http://www.securityfocus.com/bid/32506
Common Vulnerability Exposure (CVE) ID: CVE-2008-4641
BugTraq ID: 31921
http://www.securityfocus.com/bid/31921
Common Vulnerability Exposure (CVE) ID: CVE-2008-4680
Bugtraq: 20081211 rPSA-2008-0336-1 tshark wireshark (Google Search)
http://www.securityfocus.com/archive/1/archive/1/499154/100/0/threaded
http://www.mandriva.com/security/advisories?name=MDVSA-2008:215
http://www.redhat.com/support/errata/RHSA-2009-0313.html
BugTraq ID: 31838
http://www.securityfocus.com/bid/31838
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9605
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:15091
http://secunia.com/advisories/34144
http://www.vupen.com/english/advisories/2008/2872
http://securitytracker.com/id?1021069
http://secunia.com/advisories/32355
Common Vulnerability Exposure (CVE) ID: CVE-2008-4681
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11194
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:14853
XForce ISS Database: wireshark-bluetoothrfcomm-dos(46014)
http://xforce.iss.net/xforce/xfdb/46014
Common Vulnerability Exposure (CVE) ID: CVE-2008-4682
http://www.milw0rm.com/exploits/6622
http://shinnok.evonet.ro/vulns_html/wireshark.html
BugTraq ID: 31468
http://www.securityfocus.com/bid/31468
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10955
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:14705
http://securityreason.com/securityalert/4462
XForce ISS Database: wireshark-ncfpacket-dos(45505)
http://xforce.iss.net/xforce/xfdb/45505
Common Vulnerability Exposure (CVE) ID: CVE-2008-4683
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9821
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:14982
Common Vulnerability Exposure (CVE) ID: CVE-2008-4684
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10223
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:14767
Common Vulnerability Exposure (CVE) ID: CVE-2008-4685
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10788
Common Vulnerability Exposure (CVE) ID: CVE-2008-4864
Bugtraq: 20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components (Google Search)
http://www.securityfocus.com/archive/1/archive/1/507985/100/0/threaded
http://www.openwall.com/lists/oss-security/2008/10/27/2
http://www.openwall.com/lists/oss-security/2008/10/29/3
http://scary.beasts.org/security/CESA-2008-008.html
http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html
BugTraq ID: 31976
http://www.securityfocus.com/bid/31976
BugTraq ID: 31932
http://www.securityfocus.com/bid/31932
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10702
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:8354
http://secunia.com/advisories/33937
http://secunia.com/advisories/37471
http://www.vupen.com/english/advisories/2009/3316
XForce ISS Database: python-image-module-bo(46606)
http://xforce.iss.net/xforce/xfdb/46606
Common Vulnerability Exposure (CVE) ID: CVE-2008-5006
http://www.openwall.com/lists/oss-security/2008/11/03/5
Debian Security Information: DSA-1685 (Google Search)
http://www.debian.org/security/2008/dsa-1685
http://www.mandriva.com/security/advisories?name=MDVSA-2009:146
BugTraq ID: 32280
http://www.securityfocus.com/bid/32280
http://secunia.com/advisories/33142
XForce ISS Database: imap-toolkit-smtp-dos(46604)
http://xforce.iss.net/xforce/xfdb/46604
Common Vulnerability Exposure (CVE) ID: CVE-2008-5031
http://www.openwall.com/lists/oss-security/2008/11/05/2
http://www.openwall.com/lists/oss-security/2008/11/05/3
http://security.gentoo.org/glsa/glsa-200907-16.xml
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11280
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:8564
http://secunia.com/advisories/35750
XForce ISS Database: python-expandtabs-integer-overflow(46612)
http://xforce.iss.net/xforce/xfdb/46612
Common Vulnerability Exposure (CVE) ID: CVE-2008-5285
Bugtraq: 20081122 [SVRT-04-08] Vulnerability in WireShark 1.0.4 for DoS Attack (Google Search)
http://www.securityfocus.com/archive/1/archive/1/498562/100/0/threaded
http://lists.grok.org.uk/pipermail/full-disclosure/2008-November/065840.html
http://www.openwall.com/lists/oss-security/2008/11/24/1
http://www.mandriva.com/security/advisories?name=MDVSA-2008:242
BugTraq ID: 32422
http://www.securityfocus.com/bid/32422
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11351
http://www.vupen.com/english/advisories/2008/3231
http://www.securitytracker.com/id?1021275
http://secunia.com/advisories/32840
http://securityreason.com/securityalert/4663
Common Vulnerability Exposure (CVE) ID: CVE-2008-5514
https://www.redhat.com/archives/fedora-package-announce/2009-January/msg00846.html
BugTraq ID: 32958
http://www.securityfocus.com/bid/32958
http://www.vupen.com/english/advisories/2008/3490
http://securitytracker.com/id?1021485
http://secunia.com/advisories/33275
http://secunia.com/advisories/33638
XForce ISS Database: uwimapd-rfc822outputchar-dos(47526)
http://xforce.iss.net/xforce/xfdb/47526
Common Vulnerability Exposure (CVE) ID: CVE-2008-5517
Bugtraq: 20090113 rPSA-2009-0005-1 git gitweb (Google Search)
http://www.securityfocus.com/archive/1/archive/1/500008/100/0/threaded
http://repo.or.cz/w/git.git?a=commitdiff;h=516381d5
http://www.openwall.com/lists/oss-security/2009/01/20/1
http://www.openwall.com/lists/oss-security/2009/01/21/7
http://www.openwall.com/lists/oss-security/2009/01/23/2
Debian Security Information: DSA-1708 (Google Search)
http://www.debian.org/security/2009/dsa-1708
http://www.gentoo.org/security/en/glsa/glsa-200903-15.xml
SuSE Security Announcement: SUSE-SR:2009:001 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-01/msg00002.html
http://www.ubuntu.com/usn/USN-723-1
BugTraq ID: 33215
http://www.securityfocus.com/bid/33215
http://secunia.com/advisories/33964
http://secunia.com/advisories/34194
http://www.vupen.com/english/advisories/2009/0175
Common Vulnerability Exposure (CVE) ID: CVE-2008-5617
BugTraq ID: 32630
http://www.securityfocus.com/bid/32630
http://secunia.com/advisories/32857
XForce ISS Database: rsyslog-allowedsender-security-bypass(47080)
http://xforce.iss.net/xforce/xfdb/47080
Common Vulnerability Exposure (CVE) ID: CVE-2008-5618
Common Vulnerability Exposure (CVE) ID: CVE-2009-0022
http://master.samba.org/samba/ftp/patches/security/samba-3.2.6-CVE-2009-0022.patch
https://www.redhat.com/archives/fedora-package-announce/2009-January/msg00309.html
http://www.mandriva.com/security/advisories?name=MDVSA-2009:042
http://www.ubuntulinux.org/support/documentation/usn/usn-702-1
BugTraq ID: 33118
http://www.securityfocus.com/bid/33118
http://www.securitytracker.com/id?1021513
http://secunia.com/advisories/33392
http://www.vupen.com/english/advisories/2009/0017
http://osvdb.org/51152
http://secunia.com/advisories/33379
http://secunia.com/advisories/33431
XForce ISS Database: samba-file-system-security-bypass(47733)
http://xforce.iss.net/xforce/xfdb/47733
Common Vulnerability Exposure (CVE) ID: CVE-2008-5660
Bugtraq: 20081209 CORE-2008-1127 - Vinagre show_error() format string vulnerability (Google Search)
http://www.securityfocus.com/archive/1/archive/1/499057/100/0/threaded
http://www.milw0rm.com/exploits/7401
http://www.coresecurity.com/content/vinagre-format-string
https://www.redhat.com/archives/fedora-package-announce/2008-December/msg00473.html
https://www.redhat.com/archives/fedora-package-announce/2008-December/msg00485.html
http://www.mandriva.com/security/advisories?name=MDVSA-2008:240
http://www.ubuntu.com/usn/usn-689-1
http://secunia.com/advisories/33046
http://www.vupen.com/english/advisories/2008/3362
http://secunia.com/advisories/33041
http://secunia.com/advisories/33082
CopyrightCopyright (c) 2009 E-Soft Inc. http://www.securityspace.com

This is only one of 39786 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

New User Registration
Email:
UserID:
Passwd:
Please email me your monthly newsletters, informing the latest services, improvements & surveys.
Please email me a vulnerability test announcement whenever a new test is added.
   Privacy
Registered User Login
 
UserID:   
Passwd:  

 Forgot userid or passwd?
Email/Userid:




Home | About Us | Contact Us | Partner Programs | Privacy | Mailing Lists | Abuse
Security Audits | Managed DNS | Network Monitoring | Site Analyzer | Internet Research Reports
Web Probe | Whois

© 1998-2014 E-Soft Inc. All rights reserved.