English | Deutsch | Español | Português
 UserID:
 Passwd:
new user
 About:   Dedicated  | Advanced  | Standard  | Recurring  | No Risk  | Desktop  | Basic  | Single  | Security Seal  | FAQ
  Price/Feature Summary  | Order  | New Vulnerabilities  | Confidentiality  | Vulnerability Search
 Vulnerability   
Search   
    Search 73247 CVE descriptions
and 39212 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.64161
Category:Ubuntu Local Security Checks
Title:Ubuntu USN-687-1 (nfs-utils)
Summary:Ubuntu USN-687-1 (nfs-utils)
Description:
The remote host is missing an update to nfs-utils
announced via advisory USN-687-1.

Details follow:

It was discovered that nfs-utils did not properly enforce netgroup
restrictions when using TCP Wrappers. Remote attackers could bypass the
netgroup restrictions enabled by the administrator and possibly gain
access to sensitive information.

Solution:
The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 6.06 LTS:
nfs-kernel-server 1:1.0.7-3ubuntu2.1

Ubuntu 7.10:
nfs-kernel-server 1:1.1.1~
git-20070709-3ubuntu1.1

Ubuntu 8.04 LTS:
nfs-kernel-server 1:1.1.2-2ubuntu2.2

Ubuntu 8.10:
nfs-kernel-server 1:1.1.2-4ubuntu1.1

After a standard system upgrade you need to restart nfs services to effect
the necessary changes.

http://www.securityspace.com/smysecure/catid.html?in=USN-687-1

Risk factor : Critical
Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2008-4552
Bugtraq: 20081030 rPSA-2008-0307-1 nfs-client nfs-server nfs-utils (Google Search)
http://www.securityfocus.com/archive/1/archive/1/497935/100/0/threaded
http://lists.vmware.com/pipermail/security-announce/2010/000082.html
http://www.openwall.com/lists/oss-security/2012/07/19/2
http://www.openwall.com/lists/oss-security/2012/07/19/5
https://bugzilla.redhat.com/show_bug.cgi?id=458676
http://www.mandriva.com/security/advisories?name=MDVSA-2009:060
http://www.redhat.com/support/errata/RHSA-2009-1321.html
http://www.ubuntu.com/usn/USN-687-1
BugTraq ID: 31823
http://www.securityfocus.com/bid/31823
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11544
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:8325
http://secunia.com/advisories/32346
http://secunia.com/advisories/32481
http://secunia.com/advisories/33006
http://secunia.com/advisories/38794
http://secunia.com/advisories/38833
http://secunia.com/advisories/36538
http://www.vupen.com/english/advisories/2010/0528
XForce ISS Database: nfsutils-hostctl-security-bypass(45895)
http://xforce.iss.net/xforce/xfdb/45895
Common Vulnerability Exposure (CVE) ID: CVE-2008-5008
http://www.openwall.com/lists/oss-security/2008/11/03/6
http://security.gentoo.org/glsa/glsa-200812-05.xml
http://www.mandriva.com/security/advisories?name=MDVSA-2008:238
BugTraq ID: 32090
http://www.securityfocus.com/bid/32090
XForce ISS Database: secretrabbitcode-srcsinc-bo(46542)
http://xforce.iss.net/xforce/xfdb/46542
Common Vulnerability Exposure (CVE) ID: CVE-2008-5079
Bugtraq: 20081205 CVE-2008-5079: multiple listen()s on same socket corrupts the vcc table (Google Search)
http://www.securityfocus.com/archive/1/archive/1/498943/100/0/threaded
Bugtraq: 20081209 rPSA-2008-0332-1 kernel (Google Search)
http://www.securityfocus.com/archive/1/archive/1/499044/100/0/threaded
http://marc.info/?l=linux-netdev&m=122841256115780&w=2
Debian Security Information: DSA-1787 (Google Search)
http://www.debian.org/security/2009/dsa-1787
https://www.redhat.com/archives/fedora-package-announce/2008-December/msg01358.html
http://www.mandriva.com/security/advisories?name=MDVSA-2009:032
http://www.redhat.com/support/errata/RHSA-2009-0225.html
http://www.redhat.com/support/errata/RHSA-2009-0053.html
SuSE Security Announcement: SUSE-SA:2009:004 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-01/msg00006.html
SuSE Security Announcement: SUSE-SA:2009:008 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-01/msg00010.html
SuSE Security Announcement: SUSE-SA:2009:010 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00003.html
http://www.ubuntu.com/usn/usn-715-1
http://www.ubuntulinux.org/support/documentation/usn/usn-714-1
BugTraq ID: 32676
http://www.securityfocus.com/bid/32676
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11288
http://www.securitytracker.com/id?1021360
http://secunia.com/advisories/32913
http://secunia.com/advisories/33623
http://secunia.com/advisories/33641
http://secunia.com/advisories/33704
http://secunia.com/advisories/33756
http://secunia.com/advisories/33706
http://secunia.com/advisories/33854
http://secunia.com/advisories/33348
http://secunia.com/advisories/33083
http://secunia.com/advisories/34981
http://securityreason.com/securityalert/4694
Common Vulnerability Exposure (CVE) ID: CVE-2008-5314
http://www.milw0rm.com/exploits/7330
http://lurker.clamav.net/message/20081126.150241.55b1e092.en.html
http://www.openwall.com/lists/oss-security/2008/12/01/8
http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html
Debian Security Information: DSA-1680 (Google Search)
http://www.debian.org/security/2008/dsa-1680
http://security.gentoo.org/glsa/glsa-200812-21.xml
http://www.mandriva.com/security/advisories?name=MDVSA-2008:239
SuSE Security Announcement: SUSE-SR:2008:028 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00003.html
http://www.ubuntu.com/usn/usn-684-1
BugTraq ID: 32555
http://www.securityfocus.com/bid/32555
http://www.vupen.com/english/advisories/2008/3311
http://www.vupen.com/english/advisories/2009/0422
http://osvdb.org/50363
http://www.securitytracker.com/id?1021296
http://secunia.com/advisories/33016
http://secunia.com/advisories/32926
http://secunia.com/advisories/32936
http://secunia.com/advisories/33317
http://secunia.com/advisories/33195
http://secunia.com/advisories/33937
XForce ISS Database: clamav-special-dos(46985)
http://xforce.iss.net/xforce/xfdb/46985
Common Vulnerability Exposure (CVE) ID: CVE-2008-2379
http://security-net.biz/wsw/index.php?p=254&n=190
Debian Security Information: DSA-1682 (Google Search)
http://www.debian.org/security/2008/dsa-1682
https://www.redhat.com/archives/fedora-package-announce/2008-December/msg00223.html
https://www.redhat.com/archives/fedora-package-announce/2008-December/msg00449.html
SuSE Security Announcement: SUSE-SR:2008:027 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00002.html
BugTraq ID: 32603
http://www.securityfocus.com/bid/32603
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9764
http://secunia.com/advisories/33054
http://secunia.com/advisories/33071
http://www.vupen.com/english/advisories/2008/3332
http://secunia.com/advisories/32143
XForce ISS Database: squirrelmail-html-xss(47024)
http://xforce.iss.net/xforce/xfdb/47024
Common Vulnerability Exposure (CVE) ID: CVE-2007-4349
Bugtraq: 20081022 Secunia Research: HP OpenView Products Shared Trace Service Denial of Service (Google Search)
http://www.securityfocus.com/archive/1/archive/1/497648/100/0/threaded
http://secunia.com/secunia_research/2007-83/
HPdes Security Advisory: HPSBMA02390
http://marc.info/?l=bugtraq&m=122876827120961&w=2
HPdes Security Advisory: HPSBMA02391
http://marc.info/?l=bugtraq&m=122876677518654&w=2
HPdes Security Advisory: SSRT071481
BugTraq ID: 31860
http://www.securityfocus.com/bid/31860
http://www.vupen.com/english/advisories/2008/2888
http://www.securitytracker.com/id?1021092
http://secunia.com/advisories/27054
http://securityreason.com/securityalert/4501
XForce ISS Database: ov-traceservice-rpc-dos(46028)
http://xforce.iss.net/xforce/xfdb/46028
Common Vulnerability Exposure (CVE) ID: CVE-2007-4337
Bugtraq: 20070812 Streamripper 1.62.1 - Buffer Overflows (Google Search)
http://www.securityfocus.com/archive/1/archive/1/476302/100/0/threaded
Debian Security Information: DSA-1683 (Google Search)
http://www.debian.org/security/2008/dsa-1683
http://security.gentoo.org/glsa/glsa-200709-03.xml
BugTraq ID: 25278
http://www.securityfocus.com/bid/25278
http://secunia.com/advisories/33061
http://www.vupen.com/english/advisories/2007/2858
http://osvdb.org/39533
http://www.securitytracker.com/id?1018553
http://secunia.com/advisories/26406
http://secunia.com/advisories/26814
http://secunia.com/advisories/33052
Common Vulnerability Exposure (CVE) ID: CVE-2008-4829
Bugtraq: 20081119 Secunia Research: Streamripper Multiple Buffer Overflows (Google Search)
http://www.securityfocus.com/archive/1/archive/1/498486/100/0/threaded
http://secunia.com/secunia_research/2008-50/
BugTraq ID: 32356
http://www.securityfocus.com/bid/32356
http://www.vupen.com/english/advisories/2008/3207
http://www.osvdb.org/49997
http://secunia.com/advisories/32562
http://securityreason.com/securityalert/4647
Common Vulnerability Exposure (CVE) ID: CVE-2006-1173
Bugtraq: 20060620 Sendmail MIME DoS vulnerability (Google Search)
http://www.securityfocus.com/archive/1/archive/1/437928/100/0/threaded
Bugtraq: 20060624 Re: Sendmail MIME DoS vulnerability (Google Search)
http://www.securityfocus.com/archive/1/archive/1/438241/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/438330/100/0/threaded
Bugtraq: 20060721 rPSA-2006-0134-1 sendmail sendmail-cf (Google Search)
http://www.securityfocus.com/archive/1/archive/1/440744/100/0/threaded
AIX APAR: IY85415
http://www-1.ibm.com/support/search.wss?rs=0&q=IY85415&apar=only
AIX APAR: IY85930
http://www-1.ibm.com/support/search.wss?rs=0&q=IY85930&apar=only
Debian Security Information: DSA-1155 (Google Search)
http://www.debian.org/security/2006/dsa-1155
FreeBSD Security Advisory: FreeBSD-SA-06:17.sendmail
ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:17.sendmail.asc
http://www.gentoo.org/security/en/glsa/glsa-200606-19.xml
HPdes Security Advisory: HPSBTU02116
http://itrc.hp.com/service/cki/docDisplay.do?docId=c00692635
HPdes Security Advisory: SSRT061135
HPdes Security Advisory: HPSBUX02124
http://www.securityfocus.com/archive/1/archive/1/442939/100/0/threaded
HPdes Security Advisory: SSRT061159
http://www.mandriva.com/security/advisories?name=MDKSA-2006:104
OpenBSD Security Advisory: [3.8] 008: SECURITY FIX: June 15, 2006
http://www.openbsd.org/errata38.html#sendmail2
http://www.redhat.com/support/errata/RHSA-2006-0515.html
SGI Security Advisory: 20060601-01-P
ftp://patches.sgi.com/support/free/security/advisories/20060601-01-P
SGI Security Advisory: 20060602-01-U
ftp://patches.sgi.com/support/free/security/advisories/20060602-01-U.asc
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.631382
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102460-1
SuSE Security Announcement: SUSE-SA:2006:032 (Google Search)
http://lists.suse.com/archive/suse-security-announce/2006-Jun/0006.html
CERT/CC vulnerability note: VU#146718
http://www.kb.cert.org/vuls/id/146718
BugTraq ID: 18433
http://www.securityfocus.com/bid/18433
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11253
http://www.vupen.com/english/advisories/2006/2189
http://www.vupen.com/english/advisories/2006/2351
http://www.vupen.com/english/advisories/2006/2388
http://www.vupen.com/english/advisories/2006/2389
http://www.vupen.com/english/advisories/2006/2390
http://www.vupen.com/english/advisories/2006/2798
http://www.vupen.com/english/advisories/2006/3135
http://www.osvdb.org/26197
http://securitytracker.com/id?1016295
http://secunia.com/advisories/15779
http://secunia.com/advisories/20473
http://secunia.com/advisories/20641
http://secunia.com/advisories/20650
http://secunia.com/advisories/20651
http://secunia.com/advisories/20654
http://secunia.com/advisories/20673
http://secunia.com/advisories/20675
http://secunia.com/advisories/20679
http://secunia.com/advisories/20683
http://secunia.com/advisories/20684
http://secunia.com/advisories/20694
http://secunia.com/advisories/20726
http://secunia.com/advisories/20782
http://secunia.com/advisories/21042
http://secunia.com/advisories/21160
http://secunia.com/advisories/21327
http://secunia.com/advisories/21612
http://secunia.com/advisories/21647
XForce ISS Database: sendmail-multipart-mime-dos(27128)
http://xforce.iss.net/xforce/xfdb/27128
Common Vulnerability Exposure (CVE) ID: CVE-2008-2712
Bugtraq: 20080613 Collection of Vulnerabilities in Fully Patched Vim 7.1 (Google Search)
http://www.securityfocus.com/archive/1/archive/1/493352/100/0/threaded
Bugtraq: 20080701 Re: Collection of Vulnerabilities in Fully Patched Vim 7.1 (Google Search)
http://www.securityfocus.com/archive/1/archive/1/493353/100/0/threaded
Bugtraq: 20080811 rPSA-2008-0247-1 gvim vim vim-minimal (Google Search)
http://www.securityfocus.com/archive/1/archive/1/495319/100/0/threaded
http://marc.info/?l=bugtraq&m=121494431426308&w=2
Bugtraq: 20090401 VMSA-2009-0004 ESX Service Console updates for openssl, bind, and vim (Google Search)
http://www.securityfocus.com/archive/1/archive/1/502322/100/0/threaded
http://www.rdancer.org/vulnerablevim.html
http://www.openwall.com/lists/oss-security/2008/06/16/2
http://www.openwall.com/lists/oss-security/2008/10/15/1
http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html
http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html
http://www.mandriva.com/security/advisories?name=MDVSA-2008:236
http://www.redhat.com/support/errata/RHSA-2008-0617.html
http://www.redhat.com/support/errata/RHSA-2008-0580.html
http://www.redhat.com/support/errata/RHSA-2008-0618.html
SuSE Security Announcement: SUSE-SR:2009:007 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00004.html
http://www.ubuntu.com/usn/USN-712-1
BugTraq ID: 29715
http://www.securityfocus.com/bid/29715
BugTraq ID: 31681
http://www.securityfocus.com/bid/31681
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11109
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6238
http://secunia.com/advisories/34418
http://secunia.com/advisories/32858
http://secunia.com/advisories/32864
http://www.vupen.com/english/advisories/2008/1851/references
http://www.vupen.com/english/advisories/2008/2780
http://www.vupen.com/english/advisories/2009/0033
http://www.securitytracker.com/id?1020293
http://secunia.com/advisories/30731
http://secunia.com/advisories/32222
http://secunia.com/advisories/33410
http://securityreason.com/securityalert/3951
http://www.vupen.com/english/advisories/2009/0904
XForce ISS Database: vim-scripts-command-execution(43083)
http://xforce.iss.net/xforce/xfdb/43083
Common Vulnerability Exposure (CVE) ID: CVE-2008-2953
https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00101.html
https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00116.html
BugTraq ID: 29924
http://www.securityfocus.com/bid/29924
http://www.securitytracker.com/id?1020407
http://www.securitytracker.com/id?1020408
http://secunia.com/advisories/30812
http://secunia.com/advisories/30907
http://secunia.com/advisories/30918
XForce ISS Database: dc-partialfilelist-dos(43341)
http://xforce.iss.net/xforce/xfdb/43341
Common Vulnerability Exposure (CVE) ID: CVE-2008-3074
http://www.openwall.com/lists/oss-security/2008/07/07/1
http://www.openwall.com/lists/oss-security/2008/07/07/4
http://www.openwall.com/lists/oss-security/2008/07/08/12
http://www.openwall.com/lists/oss-security/2008/07/10/7
http://www.openwall.com/lists/oss-security/2008/07/13/1
http://www.openwall.com/lists/oss-security/2008/07/15/4
http://www.openwall.com/lists/oss-security/2008/08/01/1
http://www.openwall.com/lists/oss-security/2008/10/20/2
http://www.rdancer.org/vulnerablevim-shellescape.html
BugTraq ID: 32462
http://www.securityfocus.com/bid/32462
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10754
Common Vulnerability Exposure (CVE) ID: CVE-2008-3075
BugTraq ID: 32463
http://www.securityfocus.com/bid/32463
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10246
Common Vulnerability Exposure (CVE) ID: CVE-2008-3076
http://marc.info/?l=oss-security&m=122416184431388&w=2
http://www.rdancer.org/vulnerablevim-netrw.html
http://www.rdancer.org/vulnerablevim-netrw.v2.html
BugTraq ID: 30115
http://www.securityfocus.com/bid/30115
XForce ISS Database: netrw-multiple-code-execution(43624)
http://xforce.iss.net/xforce/xfdb/43624
Common Vulnerability Exposure (CVE) ID: CVE-2008-4101
Bugtraq: 20080822 Vim: Arbitrary Code Execution in Commands: K, Control-], g] (Google Search)
http://www.securityfocus.com/archive/1/495662
Bugtraq: 20080825 RE: Arbitrary Code Execution in Commands: K, Control-], g] (Google Search)
http://www.securityfocus.com/archive/1/495703
http://www.openwall.com/lists/oss-security/2008/09/11/4
http://www.openwall.com/lists/oss-security/2008/09/11/3
http://www.openwall.com/lists/oss-security/2008/09/16/5
http://www.openwall.com/lists/oss-security/2008/09/16/6
http://ftp.vim.org/pub/vim/patches/7.2/7.2.010
http://groups.google.com/group/vim_dev/msg/9290f26f9bc11b33
http://groups.google.com/group/vim_dev/attach/9290f26f9bc11b33/K-arbitrary-command-execution.patch.v3?part=2
http://groups.google.com/group/vim_dev/attach/dd32ad3a84f36bb2/K-arbitrary-command-execution.patch?part=2
http://groups.google.com/group/vim_dev/browse_thread/thread/1434d0812b5c817e/6ad2d5b50a96668e
http://www.rdancer.org/vulnerablevim-K.html
BugTraq ID: 30795
http://www.securityfocus.com/bid/30795
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10894
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:5812
http://secunia.com/advisories/31592
XForce ISS Database: vim-normal-command-execution(44626)
http://xforce.iss.net/xforce/xfdb/44626
Common Vulnerability Exposure (CVE) ID: CVE-2008-4677
Bugtraq: 20080812 Re: Vim: Netrw: FTP User Name and Password Disclosure (Google Search)
http://www.securityfocus.com/archive/1/495432
Bugtraq: 20080812 Vim: Netrw: FTP User Name and Password Disclosure (Google Search)
http://www.securityfocus.com/archive/1/495436
http://www.openwall.com/lists/oss-security/2008/10/06/4
http://www.openwall.com/lists/oss-security/2008/10/16/2
http://groups.google.com/group/vim_dev/browse_thread/thread/2f6fad581a037971/a5fcf4c4981d34e6?show_docid=a5fcf4c4981d34e6
http://www.rdancer.org/vulnerablevim-netrw-credentials-dis.html
BugTraq ID: 30670
http://www.securityfocus.com/bid/30670
http://secunia.com/advisories/31464
http://www.vupen.com/english/advisories/2008/2379
XForce ISS Database: vim-netrw-ftp-information-disclosure(44419)
http://xforce.iss.net/xforce/xfdb/44419
Common Vulnerability Exposure (CVE) ID: CVE-2008-5182
Debian Security Information: DSA-1681 (Google Search)
http://www.debian.org/security/2008/dsa-1681
BugTraq ID: 33503
http://www.securityfocus.com/bid/33503
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10584
http://secunia.com/advisories/32998
Common Vulnerability Exposure (CVE) ID: CVE-2008-5300
Bugtraq: 20100625 VMSA-2010-0010 ESX 3.5 third party update for Service Console kernel (Google Search)
http://www.securityfocus.com/archive/1/archive/1/512019/100/0/threaded
http://marc.info/?l=linux-netdev&m=122721862313564&w=2
http://marc.info/?l=linux-netdev&m=122765505415944&w=2
http://www.redhat.com/support/errata/RHSA-2009-0014.html
RedHat Security Advisories: RHSA-2009:1550
https://rhn.redhat.com/errata/RHSA-2009-1550.html
BugTraq ID: 32516
http://www.securityfocus.com/bid/32516
http://osvdb.org/50272
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10283
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11427
http://secunia.com/advisories/33556
http://securityreason.com/securityalert/4673
XForce ISS Database: linux-kernel-sendmsg-dos(46943)
http://xforce.iss.net/xforce/xfdb/46943
Common Vulnerability Exposure (CVE) ID: CVE-2008-4025
Bugtraq: 20081209 Secunia Research: Microsoft Word RTF Polyline/Polygon Integer Overflow (Google Search)
http://www.securityfocus.com/archive/1/archive/1/499054/100/0/threaded
Microsoft Security Bulletin: MS08-072
http://www.microsoft.com/technet/security/Bulletin/MS08-072.mspx
http://secunia.com/secunia_research/2008-21/
Cert/CC Advisory: TA08-344A
http://www.us-cert.gov/cas/techalerts/TA08-344A.html
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:5682
http://www.vupen.com/english/advisories/2008/3384
http://www.securitytracker.com/id?1021370
Common Vulnerability Exposure (CVE) ID: CVE-2008-4266
Bugtraq: 20081209 Secunia Research: Microsoft Excel NAME Record Array Indexing Vulnerability (Google Search)
http://www.securityfocus.com/archive/1/archive/1/499055/100/0/threaded
http://secunia.com/secunia_research/2008-36/
Microsoft Security Bulletin: MS08-074
http://www.microsoft.com/technet/security/Bulletin/MS08-074.mspx
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:5808
http://www.vupen.com/english/advisories/2008/3386
http://www.securitytracker.com/id?1021368
Common Vulnerability Exposure (CVE) ID: CVE-2008-4261
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=761
Microsoft Security Bulletin: MS08-073
http://www.microsoft.com/technet/security/Bulletin/MS08-073.mspx
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:5829
http://www.vupen.com/english/advisories/2008/3385
http://www.securitytracker.com/id?1021371
Common Vulnerability Exposure (CVE) ID: CVE-2008-2249
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=762
Microsoft Security Bulletin: MS08-071
http://www.microsoft.com/technet/security/Bulletin/MS08-071.mspx
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:5984
http://www.vupen.com/english/advisories/2008/3383
http://www.securitytracker.com/id?1021365
Common Vulnerability Exposure (CVE) ID: CVE-2008-4254
Bugtraq: 20081209 Secunia Research: Microsoft Hierarchical FlexGrid Control Integer Overflows (Google Search)
http://www.securityfocus.com/archive/1/archive/1/499059/100/0/threaded
http://secunia.com/secunia_research/2007-72/
Microsoft Security Bulletin: MS08-070
http://www.microsoft.com/technet/security/Bulletin/MS08-070.mspx
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:5805
http://www.vupen.com/english/advisories/2008/3382
http://www.securitytracker.com/id?1021369
CopyrightCopyright (c) 2009 E-Soft Inc. http://www.securityspace.com

This is only one of 39212 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

New User Registration
Email:
UserID:
Passwd:
Please email me your monthly newsletters, informing the latest services, improvements & surveys.
Please email me a vulnerability test announcement whenever a new test is added.
   Privacy
Registered User Login
 
UserID:   
Passwd:  

 Forgot userid or passwd?
Email/Userid:




Home | About Us | Contact Us | Partner Programs | Privacy | Mailing Lists | Abuse
Security Audits | Managed DNS | Network Monitoring | Site Analyzer | Internet Research Reports
Web Probe | Whois

© 1998-2014 E-Soft Inc. All rights reserved.