English | Deutsch | Español | Português
 UserID:
 Passwd:
new user
 About:   Dedicated  | Advanced  | Standard  | Recurring  | No Risk  | Desktop  | Basic  | Single  | Security Seal  | FAQ
  Price/Feature Summary  | Order  | New Vulnerabilities  | Confidentiality  | Vulnerability Search
 Vulnerability   
Search   
    Search 76783 CVE descriptions
and 40246 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.63891
Category:SuSE Local Security Checks
Title:SuSE Security Summary SUSE-SR:2009:009
Summary:SuSE Security Advisory SUSE-SR:2009:009
Description:The remote host is missing updates announced in
advisory SUSE-SR:2009:009. SuSE Security Summaries are short
on detail when it comes to the names of packages affected by
a particular bug. Because of this, while this test will detect
out of date packages, it cannot tell you what bugs impact
which packages, or vice versa.

Solution:

Update all out of date packages.
Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2008-4311
http://lists.freedesktop.org/archives/dbus/2008-December/010702.html
https://www.redhat.com/archives/fedora-package-announce/2008-December/msg00436.html
SuSE Security Announcement: SUSE-SA:2009:013 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00003.html
SuSE Security Announcement: SUSE-SR:2009:008 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00003.html
SuSE Security Announcement: SUSE-SR:2009:009 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00010.html
SuSE Security Announcement: openSUSE-SU-2012:1418 (Google Search)
http://lists.opensuse.org/opensuse-updates/2012-10/msg00094.html
BugTraq ID: 32674
http://www.securityfocus.com/bid/32674
http://secunia.com/advisories/34360
http://secunia.com/advisories/34642
http://www.vupen.com/english/advisories/2008/3355
http://secunia.com/advisories/33047
http://secunia.com/advisories/33055
XForce ISS Database: dbus-sendreceive-security-bypass(47138)
http://xforce.iss.net/xforce/xfdb/47138
Common Vulnerability Exposure (CVE) ID: CVE-2008-4989
Bugtraq: 20081117 rPSA-2008-0322-1 gnutls (Google Search)
http://www.securityfocus.com/archive/1/archive/1/498431/100/0/threaded
http://article.gmane.org/gmane.comp.encryption.gpg.gnutls.devel/3217
http://article.gmane.org/gmane.comp.encryption.gpg.gnutls.devel/3215
Debian Security Information: DSA-1719 (Google Search)
http://www.debian.org/security/2009/dsa-1719
https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00222.html
https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00293.html
http://security.gentoo.org/glsa/glsa-200901-10.xml
http://www.mandriva.com/security/advisories?name=MDVSA-2008:227
http://www.redhat.com/support/errata/RHSA-2008-0982.html
http://sunsolve.sun.com/search/document.do?assetkey=1-26-260528-1
SuSE Security Announcement: SUSE-SR:2008:027 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00002.html
http://www.ubuntulinux.org/support/documentation/usn/usn-678-1
http://www.ubuntu.com/usn/usn-678-2
BugTraq ID: 32232
http://www.securityfocus.com/bid/32232
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11650
http://www.securitytracker.com/id?1021167
http://secunia.com/advisories/35423
http://secunia.com/advisories/32687
http://www.vupen.com/english/advisories/2008/3086
http://secunia.com/advisories/32619
http://secunia.com/advisories/32879
http://secunia.com/advisories/32681
http://secunia.com/advisories/33501
http://secunia.com/advisories/33694
http://www.vupen.com/english/advisories/2009/1567
XForce ISS Database: gnutls-x509-name-spoofing(46482)
http://xforce.iss.net/xforce/xfdb/46482
Common Vulnerability Exposure (CVE) ID: CVE-2009-0193
Bugtraq: 20090325 Secunia Research: Adobe Reader JBIG2 Symbol Dictionary Buffer Overflow (Google Search)
http://www.securityfocus.com/archive/1/archive/1/502155/100/0/threaded
http://secunia.com/secunia_research/2009-14/
http://security.gentoo.org/glsa/glsa-200904-17.xml
http://www.redhat.com/support/errata/RHSA-2009-0376.html
http://sunsolve.sun.com/search/document.do?assetkey=1-66-256788-1
SuSE Security Announcement: SUSE-SA:2009:014 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00005.html
BugTraq ID: 34229
http://www.securityfocus.com/bid/34229
http://www.securitytracker.com/id?1021892
http://secunia.com/advisories/34392
http://secunia.com/advisories/34490
http://secunia.com/advisories/34706
http://secunia.com/advisories/34790
http://www.vupen.com/english/advisories/2009/1019
Common Vulnerability Exposure (CVE) ID: CVE-2009-0196
Bugtraq: 20090409 Secunia Research: Ghostscript jbig2dec JBIG2 Processing Buffer Overflow (Google Search)
http://www.securityfocus.com/archive/1/archive/1/502586/100/0/threaded
Bugtraq: 20090417 rPSA-2009-0060-1 ghostscript (Google Search)
http://www.securityfocus.com/archive/1/archive/1/502757/100/0/threaded
http://secunia.com/secunia_research/2009-21/
https://bugzilla.redhat.com/attachment.cgi?id=337747
https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00460.html
https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00461.html
http://www.mandriva.com/security/advisories?name=MDVSA-2009:095
http://www.redhat.com/support/errata/RHSA-2009-0421.html
http://sunsolve.sun.com/search/document.do?assetkey=1-26-262288-1
SuSE Security Announcement: SUSE-SR:2009:011 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00003.html
http://www.ubuntulinux.org/support/documentation/usn/usn-757-1
BugTraq ID: 34445
http://www.securityfocus.com/bid/34445
http://osvdb.org/53492
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10533
http://www.securitytracker.com/id?1022029
http://secunia.com/advisories/34292
http://secunia.com/advisories/34732
http://secunia.com/advisories/34729
http://secunia.com/advisories/34667
http://secunia.com/advisories/35416
http://secunia.com/advisories/35559
http://secunia.com/advisories/35569
http://www.vupen.com/english/advisories/2009/0983
http://www.vupen.com/english/advisories/2009/1708
Common Vulnerability Exposure (CVE) ID: CVE-2009-0365
Debian Security Information: DSA-1955 (Google Search)
http://www.debian.org/security/2009/dsa-1955
http://www.redhat.com/support/errata/RHSA-2009-0362.html
http://www.redhat.com/support/errata/RHSA-2009-0361.html
http://www.ubuntu.com/usn/USN-727-1
http://www.ubuntu.com/usn/USN-727-2
BugTraq ID: 33966
http://www.securityfocus.com/bid/33966
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10828
http://www.securitytracker.com/id?1021908
http://securitytracker.com/id?1021910
http://securitytracker.com/id?1021911
http://secunia.com/advisories/34177
http://secunia.com/advisories/34473
http://secunia.com/advisories/34067
XForce ISS Database: networkmanager-dbus-info-disclosure(49062)
http://xforce.iss.net/xforce/xfdb/49062
Common Vulnerability Exposure (CVE) ID: CVE-2009-0578
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:8931
http://www.securitytracker.com/id?1021909
XForce ISS Database: networkmanager-dbus-security-bypass(49063)
http://xforce.iss.net/xforce/xfdb/49063
Common Vulnerability Exposure (CVE) ID: CVE-2009-0586
Bugtraq: 20090312 [oCERT-2008-015] glib and glib-predecessor heap overflows (Google Search)
http://www.securityfocus.com/archive/1/archive/1/501712/100/0/threaded
http://openwall.com/lists/oss-security/2009/03/12/2
http://ocert.org/patches/2008-015/gst-plugins-base-CVE-2009-0586.diff
http://www.ocert.org/advisories/ocert-2008-015.html
http://security.gentoo.org/glsa/glsa-200907-11.xml
http://www.mandriva.com/security/advisories?name=MDVSA-2009:085
http://www.ubuntu.com/usn/USN-735-1
BugTraq ID: 34100
http://www.securityfocus.com/bid/34100
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9694
http://secunia.com/advisories/34335
http://secunia.com/advisories/34350
http://secunia.com/advisories/35777
XForce ISS Database: gstreamer-gstvorbistagaddcoverart-bo(49274)
http://xforce.iss.net/xforce/xfdb/49274
Common Vulnerability Exposure (CVE) ID: CVE-2009-0658
http://www.milw0rm.com/exploits/8090
http://www.milw0rm.com/exploits/8099
http://isc.sans.org/diary.html?n&storyid=5902
http://www.shadowserver.org/wiki/pmwiki.php?n=Calendar.20090219
http://www.symantec.com/security_response/writeup.jsp?docid=2009-021212-5523-99&tabid=2
Cert/CC Advisory: TA09-051A
http://www.us-cert.gov/cas/techalerts/TA09-051A.html
CERT/CC vulnerability note: VU#905281
http://www.kb.cert.org/vuls/id/905281
BugTraq ID: 33751
http://www.securityfocus.com/bid/33751
http://www.vupen.com/english/advisories/2009/0472
http://osvdb.org/52073
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:5697
http://www.securitytracker.com/id?1021739
http://secunia.com/advisories/33901
XForce ISS Database: adobe-acrobat-reader-image-bo(48825)
http://xforce.iss.net/xforce/xfdb/48825
Common Vulnerability Exposure (CVE) ID: CVE-2009-0698
Bugtraq: 20090128 [TKADV2009-004] FFmpeg Type Conversion Vulnerability (Google Search)
http://www.securityfocus.com/archive/1/archive/1/500514/100/0/threaded
http://www.trapkit.de/advisories/TKADV2009-004.txt
http://www.mandriva.com/security/advisories?name=MDVSA-2009:298
http://www.mandriva.com/security/advisories?name=MDVSA-2009:299
http://www.ubuntu.com/usn/USN-746-1
XForce ISS Database: xinelib-4xmdemuxer-code-execution(48954)
http://xforce.iss.net/xforce/xfdb/48954
Common Vulnerability Exposure (CVE) ID: CVE-2009-0790
Bugtraq: 20090330 CVE-2009-0790: ISAKMP DPD Remote Vulnerability with Openswan & Strongswan IPsec (Google Search)
http://www.securityfocus.com/archive/1/archive/1/502270/100/0/threaded
Debian Security Information: DSA-1759 (Google Search)
http://www.debian.org/security/2009/dsa-1759
Debian Security Information: DSA-1760 (Google Search)
http://www.debian.org/security/2009/dsa-1760
http://www.redhat.com/support/errata/RHSA-2009-0402.html
BugTraq ID: 34296
http://www.securityfocus.com/bid/34296
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11171
http://www.securitytracker.com/id?1021949
http://www.securitytracker.com/id?1021950
http://secunia.com/advisories/34472
http://secunia.com/advisories/34483
http://secunia.com/advisories/34494
http://secunia.com/advisories/34546
http://www.vupen.com/english/advisories/2009/0886
XForce ISS Database: openswan-strongswan-dpd-dos(49523)
http://xforce.iss.net/xforce/xfdb/49523
Common Vulnerability Exposure (CVE) ID: CVE-2009-0792
https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00211.html
https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00217.html
http://www.mandriva.com/security/advisories?name=MDVSA-2009:096
http://www.redhat.com/support/errata/RHSA-2009-0420.html
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11207
http://secunia.com/advisories/34373
http://secunia.com/advisories/34711
http://secunia.com/advisories/34726
XForce ISS Database: ghostscript-icc-bo(50381)
http://xforce.iss.net/xforce/xfdb/50381
Common Vulnerability Exposure (CVE) ID: CVE-2009-0922
Bugtraq: 20090519 rPSA-2009-0086-1 postgresql postgresql-contrib postgresql-server (Google Search)
http://www.securityfocus.com/archive/1/archive/1/503598/100/0/threaded
http://www.openwall.com/lists/oss-security/2009/03/11/4
http://archives.postgresql.org/pgsql-bugs/2009-02/msg00172.php
http://archives.postgresql.org//pgsql-bugs/2009-02/msg00176.php
https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00810.html
https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00843.html
http://www.mandriva.com/security/advisories?name=MDVSA-2009:079
http://www.redhat.com/support/errata/RHSA-2009-1067.html
http://sunsolve.sun.com/search/document.do?assetkey=1-66-258808-1
http://sunsolve.sun.com/search/document.do?assetkey=1-77-1020455.1-1
BugTraq ID: 34090
http://www.securityfocus.com/bid/34090
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10874
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6252
http://www.securitytracker.com/id?1021860
http://secunia.com/advisories/34453
http://secunia.com/advisories/35100
http://www.vupen.com/english/advisories/2009/0767
http://www.vupen.com/english/advisories/2009/1316
Common Vulnerability Exposure (CVE) ID: CVE-2009-0927
Bugtraq: 20090324 ZDI-09-014: Adobe Acrobat getIcon() Stack Overflow Vulnerability (Google Search)
http://www.securityfocus.com/archive/1/archive/1/502116/100/0/threaded
http://www.exploit-db.com/exploits/9579
http://www.zerodayinitiative.com/advisories/ZDI-09-014
BugTraq ID: 34169
http://www.securityfocus.com/bid/34169
http://www.securitytracker.com/id?1021861
http://www.vupen.com/english/advisories/2009/0770
XForce ISS Database: adobe-unspecified-javascript-code-execution(49312)
http://xforce.iss.net/xforce/xfdb/49312
Common Vulnerability Exposure (CVE) ID: CVE-2009-0928
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=776
Common Vulnerability Exposure (CVE) ID: CVE-2009-1061
Common Vulnerability Exposure (CVE) ID: CVE-2009-1062
http://www.ivizsecurity.com/security-advisory-iviz-sr-09001.html
Common Vulnerability Exposure (CVE) ID: CVE-2009-1171
Bugtraq: 20090327 Moodle: Sensitive File Disclosure (Google Search)
http://www.securityfocus.com/archive/1/archive/1/502231/100/0/threaded
http://tracker.moodle.org/browse/MDL-18552
Debian Security Information: DSA-1761 (Google Search)
http://www.debian.org/security/2009/dsa-1761
https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00077.html
https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00079.html
http://www.ubuntulinux.org/support/documentation/usn/usn-791-2
BugTraq ID: 34278
http://www.securityfocus.com/bid/34278
http://www.milw0rm.com/exploits/8297
http://secunia.com/advisories/34517
http://secunia.com/advisories/34557
http://secunia.com/advisories/34600
http://secunia.com/advisories/35570
Common Vulnerability Exposure (CVE) ID: CVE-2009-1241
Bugtraq: 20090402 [TZO-05-2009] Clamav 0.94 and below - Evasion /bypass (Google Search)
http://www.securityfocus.com/archive/1/archive/1/502366/100/0/threaded
http://www.openwall.com/lists/oss-security/2009/04/07/6
http://blog.zoller.lu/2009/04/clamav-094-and-below-evasion-and-bypass.html
http://lists.apple.com/archives/security-announce/2009/Sep/msg00004.html
http://www.mandriva.com/security/advisories?name=MDVSA-2009:097
BugTraq ID: 34344
http://www.securityfocus.com/bid/34344
http://secunia.com/advisories/36701
http://www.vupen.com/english/advisories/2009/0934
CopyrightCopyright (c) 2009 E-Soft Inc. http://www.securityspace.com

This is only one of 40246 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

New User Registration
Email:
UserID:
Passwd:
Please email me your monthly newsletters, informing the latest services, improvements & surveys.
Please email me a vulnerability test announcement whenever a new test is added.
   Privacy
Registered User Login
 
UserID:   
Passwd:  

 Forgot userid or passwd?
Email/Userid:




Home | About Us | Contact Us | Partner Programs | Developer APIs | Privacy | Mailing Lists | Abuse
Security Audits | Managed DNS | Network Monitoring | Site Analyzer | Internet Research Reports
Web Probe | Whois

© 1998-2014 E-Soft Inc. All rights reserved.