English | Deutsch | Español | Português
 UserID:
 Passwd:
new user
 About:   Dedicated  | Advanced  | Standard  | Recurring  | No Risk  | Desktop  | Basic  | Single  | Security Seal  | FAQ
  Price/Feature Summary  | Order  | New Vulnerabilities  | Confidentiality  | Vulnerability Search
 Vulnerability   
Search   
    Search 75096 CVE descriptions
and 39644 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.64172
Category:Ubuntu Local Security Checks
Title:Ubuntu USN-771-1 (libmodplug)
Summary:Ubuntu USN-771-1 (libmodplug)
Description:The remote host is missing an update to libmodplug
announced via advisory USN-771-1.

Details follow:

It was discovered that libmodplug did not correctly handle certain
parameters when parsing MED media files. If a user or automated system were
tricked into opening a crafted MED file, an attacker could execute
arbitrary code with privileges of the user invoking the program.
(CVE-2009-1438)

Manfred Tremmel and Stanislav Brabec discovered that libmodplug did not
correctly handle long instrument names when parsing PAT sample files. If a
user or automated system were tricked into opening a crafted PAT file, an
attacker could cause a denial of service or execute arbitrary code with
privileges of the user invoking the program. This issue only affected
Ubuntu 9.04. (CVE-2009-1438)

Solution:
The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 6.06 LTS:
libmodplug0c2 1:0.7-5ubuntu0.6.06.2

Ubuntu 8.04 LTS:
libmodplug0c2 1:0.7-7ubuntu0.8.04.1

Ubuntu 8.10:
libmodplug0c2 1:0.7-7ubuntu0.8.10.1

Ubuntu 9.04:
libmodplug0c2 1:0.8.4-3ubuntu1.1

In general, a standard system upgrade is sufficient to effect the
necessary changes.

http://www.securityspace.com/smysecure/catid.html?in=USN-771-1
Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2009-1438
http://www.openwall.com/lists/oss-security/2009/04/21/4
http://modplug-xmms.cvs.sourceforge.net/viewvc/modplug-xmms/libmodplug/src/load_med.cpp?r1=1.1&r2=1.2
Debian Security Information: DSA-1850 (Google Search)
http://www.debian.org/security/2009/dsa-1850
Debian Security Information: DSA-1851 (Google Search)
http://www.debian.org/security/2009/dsa-1851
http://www.redhat.com/archives/fedora-package-announce/2009-April/msg00907.html
http://www.redhat.com/archives/fedora-package-announce/2009-April/msg00908.html
http://security.gentoo.org/glsa/glsa-200907-07.xml
http://www.mandriva.com/security/advisories?name=MDVSA-2009:128
SuSE Security Announcement: SUSE-SR:2009:012 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html
http://www.ubuntu.com/usn/USN-771-1
BugTraq ID: 30801
http://www.securityfocus.com/bid/30801
http://osvdb.org/53801
http://secunia.com/advisories/34797
http://secunia.com/advisories/34930
http://secunia.com/advisories/35026
http://secunia.com/advisories/35685
http://secunia.com/advisories/35736
http://secunia.com/advisories/36158
http://secunia.com/advisories/36183
http://www.vupen.com/english/advisories/2009/1104
XForce ISS Database: libmodplug-csoundfilereadmed-bo(50388)
http://xforce.iss.net/xforce/xfdb/50388
Common Vulnerability Exposure (CVE) ID: CVE-2009-1513
http://www.openwall.com/lists/oss-security/2009/04/29/5
BugTraq ID: 34747
http://www.securityfocus.com/bid/34747
http://osvdb.org/54109
http://secunia.com/advisories/34927
http://www.vupen.com/english/advisories/2009/1200
Common Vulnerability Exposure (CVE) ID: CVE-2009-0757
http://www.openwall.com/lists/oss-security/2009/03/02/4
http://www.ubuntu.com/usn/USN-772-1
BugTraq ID: 33945
http://www.securityfocus.com/bid/33945
http://secunia.com/advisories/34204
http://secunia.com/advisories/35028
Common Vulnerability Exposure (CVE) ID: CVE-2009-1194
Bugtraq: 20090507 [oCERT-2009-001] Pango integer overflow in heap allocation size calculations (Google Search)
http://www.securityfocus.com/archive/1/archive/1/503349/100/0/threaded
http://www.openwall.com/lists/oss-security/2009/05/07/1
http://www.ocert.org/advisories/ocert-2009-001.html
Debian Security Information: DSA-1798 (Google Search)
http://www.debian.org/security/2009/dsa-1798
http://www.redhat.com/support/errata/RHSA-2009-0476.html
http://sunsolve.sun.com/search/document.do?assetkey=1-66-264308-1
SuSE Security Announcement: SUSE-SA:2009:042 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-08/msg00002.html
SuSE Security Announcement: SUSE-SA:2009:039 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00005.html
http://www.ubuntu.com/usn/USN-773-1
BugTraq ID: 34870
http://www.securityfocus.com/bid/34870
BugTraq ID: 35758
http://www.securityfocus.com/bid/35758
http://osvdb.org/54279
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10137
http://www.securitytracker.com/id?1022196
http://secunia.com/advisories/35018
http://secunia.com/advisories/35021
http://secunia.com/advisories/35027
http://secunia.com/advisories/35038
http://secunia.com/advisories/35914
http://secunia.com/advisories/36145
http://secunia.com/advisories/36005
http://www.vupen.com/english/advisories/2009/1269
http://www.vupen.com/english/advisories/2009/1972
XForce ISS Database: pango-pangoglyphstringsetsize-bo(50397)
http://xforce.iss.net/xforce/xfdb/50397
Common Vulnerability Exposure (CVE) ID: CVE-2009-1364
Debian Security Information: DSA-1796 (Google Search)
http://www.debian.org/security/2009/dsa-1796
https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01269.html
https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01266.html
https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01263.html
http://security.gentoo.org/glsa/glsa-200907-01.xml
http://www.mandriva.com/security/advisories?name=MDVSA-2009:106
RedHat Security Advisories: RHSA-2009:0457
http://rhn.redhat.com/errata/RHSA-2009-0457.html
SuSE Security Announcement: SUSE-SR:2009:011 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00003.html
http://www.ubuntu.com/usn/USN-769-1
BugTraq ID: 34792
http://www.securityfocus.com/bid/34792
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10959
http://www.securitytracker.com/id?1022154
http://secunia.com/advisories/34964
http://secunia.com/advisories/35001
http://secunia.com/advisories/34901
http://secunia.com/advisories/35025
http://secunia.com/advisories/35190
http://secunia.com/advisories/35416
http://secunia.com/advisories/35686
http://www.vupen.com/english/advisories/2009/1228
XForce ISS Database: libwmf-gdlibrary-code-execution(50290)
http://xforce.iss.net/xforce/xfdb/50290
Common Vulnerability Exposure (CVE) ID: CVE-2009-0719
HPdes Security Advisory: HPSBUX02366
http://www.securityfocus.com/archive/1/503038
HPdes Security Advisory: SSRT080120
BugTraq ID: 34748
http://www.securityfocus.com/bid/34748
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:5791
Common Vulnerability Exposure (CVE) ID: CVE-2009-0652
http://lists.immunitysec.com/pipermail/dailydave/2009-February/005556.html
http://lists.immunitysec.com/pipermail/dailydave/2009-February/005563.html
http://www.blackhat.com/html/bh-dc-09/bh-dc-09-speakers.html#Marlinspike
https://www.blackhat.com/presentations/bh-dc-09/Marlinspike/BlackHat-DC-09-Marlinspike-Defeating-SSL.pdf
Debian Security Information: DSA-1797 (Google Search)
http://www.debian.org/security/2009/dsa-1797
Debian Security Information: DSA-1830 (Google Search)
http://www.debian.org/security/2009/dsa-1830
https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00683.html
http://www.mandriva.com/security/advisories?name=MDVSA-2009:111
http://www.redhat.com/support/errata/RHSA-2009-0436.html
RedHat Security Advisories: RHSA-2009:0437
http://rhn.redhat.com/errata/RHSA-2009-0437.html
SuSE Security Announcement: SUSE-SR:2009:010 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00000.html
http://www.ubuntulinux.org/support/documentation/usn/usn-764-1
BugTraq ID: 33837
http://www.securityfocus.com/bid/33837
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11396
http://secunia.com/advisories/34096
http://secunia.com/advisories/34894
http://secunia.com/advisories/34843
http://secunia.com/advisories/34844
http://secunia.com/advisories/35065
http://secunia.com/advisories/35042
http://www.vupen.com/english/advisories/2009/1125
XForce ISS Database: mozilla-firefox-homoglyph-spoofing(48974)
http://xforce.iss.net/xforce/xfdb/48974
Common Vulnerability Exposure (CVE) ID: CVE-2009-1302
http://www.mandriva.com/security/advisories?name=MDVSA-2009:141
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.454275
BugTraq ID: 34656
http://www.securityfocus.com/bid/34656
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10106
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:5527
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6070
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6170
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:7030
http://www.securitytracker.com/id?1022090
http://secunia.com/advisories/34758
http://secunia.com/advisories/34780
http://secunia.com/advisories/35602
Common Vulnerability Exposure (CVE) ID: CVE-2009-1303
http://www.redhat.com/support/errata/RHSA-2009-1125.html
http://www.redhat.com/support/errata/RHSA-2009-1126.html
http://www.ubuntu.com/usn/usn-782-1
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:5810
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:5992
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6151
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6646
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9455
http://secunia.com/advisories/35536
Common Vulnerability Exposure (CVE) ID: CVE-2009-1304
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:5319
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:5480
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6015
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:7516
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9535
Common Vulnerability Exposure (CVE) ID: CVE-2009-1305
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10110
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6090
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6232
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6248
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6921
Common Vulnerability Exposure (CVE) ID: CVE-2009-1306
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10150
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6021
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6194
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6312
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6710
http://www.securitytracker.com/id?1022095
Common Vulnerability Exposure (CVE) ID: CVE-2009-1307
https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00444.html
https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00504.html
http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.425408
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10972
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:5933
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6154
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6266
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:7008
http://www.securitytracker.com/id?1022093
http://secunia.com/advisories/35561
http://secunia.com/advisories/35882
Common Vulnerability Exposure (CVE) ID: CVE-2009-1308
http://www.theregister.co.uk/2009/03/08/ebay_scam_wizardy/
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10428
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6173
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6185
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6296
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:7285
http://www.securitytracker.com/id?1022097
Common Vulnerability Exposure (CVE) ID: CVE-2009-1309
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:5265
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:5591
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6139
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6831
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9494
http://www.securitytracker.com/id?1022094
Common Vulnerability Exposure (CVE) ID: CVE-2009-1311
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10939
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6200
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6222
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:7235
Common Vulnerability Exposure (CVE) ID: CVE-2009-1312
Bugtraq: 20090702 Cross-Site Scripting vulnerabilities in Mozilla, Internet Explorer, Opera and Chrome (Google Search)
http://www.securityfocus.com/archive/1/archive/1/504718/100/0/threaded
Bugtraq: 20090703 Re: Cross-Site Scripting vulnerabilities in Mozilla, Internet Explorer, Opera and Chrome (Google Search)
http://www.securityfocus.com/archive/1/archive/1/504723/100/0/threaded
http://ha.ckers.org/blog/20070309/firefox-header-redirection-javascript-execution/
http://websecurity.com.ua/3275/
http://websecurity.com.ua/3386/
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6064
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6131
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6731
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9818
http://www.securitytracker.com/id?1022096
Common Vulnerability Exposure (CVE) ID: CVE-2009-1572
http://www.openwall.com/lists/oss-security/2009/05/01/1
http://www.openwall.com/lists/oss-security/2009/05/01/2
http://marc.info/?l=quagga-dev&m=123364779626078&w=2
http://thread.gmane.org/gmane.network.quagga.devel/6513
Debian Security Information: DSA-1788 (Google Search)
http://www.debian.org/security/2009/dsa-1788
https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01037.html
https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01107.html
http://www.mandriva.com/security/advisories?name=MDVSA-2009:109
http://www.ubuntu.com/usn/usn-775-1
BugTraq ID: 34817
http://www.securityfocus.com/bid/34817
http://www.osvdb.org/54200
http://www.securitytracker.com/id?1022164
http://secunia.com/advisories/34999
http://secunia.com/advisories/35061
http://secunia.com/advisories/35203
XForce ISS Database: quagga-systemnumber-dos(50317)
http://xforce.iss.net/xforce/xfdb/50317
Common Vulnerability Exposure (CVE) ID: CVE-2009-1482
Debian Security Information: DSA-1791 (Google Search)
http://www.debian.org/security/2009/dsa-1791
http://www.ubuntu.com/usn/USN-774-1
BugTraq ID: 34631
http://www.securityfocus.com/bid/34631
http://secunia.com/advisories/34821
http://secunia.com/advisories/35024
http://secunia.com/advisories/34945
http://www.vupen.com/english/advisories/2009/1119
XForce ISS Database: moinmoin-errormsg-xss(50356)
http://xforce.iss.net/xforce/xfdb/50356
Common Vulnerability Exposure (CVE) ID: CVE-2008-0068
Bugtraq: 20080414 Secunia Research: HP OpenView Network Node Manager OpenView5.exeDirectory Traversal (Google Search)
http://www.securityfocus.com/archive/1/archive/1/490834/100/0/threaded
Bugtraq: 20080411 Directory traversal and multiple Denials of Service in HP OpenView NNM 7.53 (Google Search)
http://www.securityfocus.com/archive/1/490771
http://aluigi.altervista.org/adv/closedviewx-adv.txt
http://secunia.com/secunia_research/2008-4/advisory/
HPdes Security Advisory: HPSBMA02349
http://marc.info/?l=bugtraq&m=121553649611253&w=2
HPdes Security Advisory: SSRT080043
BugTraq ID: 28745
http://www.securityfocus.com/bid/28745
http://www.vupen.com/english/advisories/2008/1214/references
http://www.osvdb.org/44359
http://www.securitytracker.com/id?1019838
http://www.securitytracker.com/id?1019839
http://secunia.com/advisories/29796
http://securityreason.com/securityalert/3814
XForce ISS Database: hpopenview-openview5-directory-traversal(41790)
http://xforce.iss.net/xforce/xfdb/41790
Common Vulnerability Exposure (CVE) ID: CVE-2008-1697
http://www.milw0rm.com/exploits/5342
http://www.offensive-security.com/0day/hp-nnm-ov.py.txt
HPdes Security Advisory: HPSBMA02348
http://marc.info/?l=bugtraq&m=121553626110871&w=2
HPdes Security Advisory: SSRT080033
BugTraq ID: 28569
http://www.securityfocus.com/bid/28569
http://www.vupen.com/english/advisories/2008/1085/references
http://www.securitytracker.com/id?1019782
http://secunia.com/advisories/29641
XForce ISS Database: hpopenview-ovas-bo(41600)
http://xforce.iss.net/xforce/xfdb/41600
Common Vulnerability Exposure (CVE) ID: CVE-2008-0928
http://marc.info/?l=debian-security&m=120343592917055&w=2
Debian Security Information: DSA-1799 (Google Search)
http://www.debian.org/security/2009/dsa-1799
https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00900.html
https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00957.html
https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00852.html
https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00857.html
http://www.redhat.com/archives/fedora-package-announce/2008-February/msg00830.html
http://www.redhat.com/archives/fedora-package-announce/2008-February/msg00850.html
http://www.mandriva.com/security/advisories?name=MDVSA-2008:162
http://www.mandriva.com/security/advisories?name=MDVSA-2009:016
http://www.redhat.com/support/errata/RHSA-2008-0194.html
SuSE Security Announcement: SUSE-SR:2009:008 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00003.html
BugTraq ID: 28001
http://www.securityfocus.com/bid/28001
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9706
http://secunia.com/advisories/29172
http://secunia.com/advisories/29081
http://secunia.com/advisories/29963
http://secunia.com/advisories/29129
http://secunia.com/advisories/29136
http://secunia.com/advisories/34642
http://secunia.com/advisories/35031
Common Vulnerability Exposure (CVE) ID: CVE-2008-4539
http://www.mail-archive.com/cvs-all@freebsd.org/msg129730.html
http://groups.google.com/group/linux.debian.changes.devel/msg/9e0dc008572f2867?dmode=source
http://www.mail-archive.com/secure-testing-commits@lists.alioth.debian.org/msg09322.html
https://www.redhat.com/archives/fedora-package-announce/2008-December/msg01223.html
http://www.ubuntu.com/usn/usn-776-1
http://secunia.com/advisories/25073
http://secunia.com/advisories/33350
http://secunia.com/advisories/35062
XForce ISS Database: qemu-kvm-cirrusvga-bo(47736)
http://xforce.iss.net/xforce/xfdb/47736
Common Vulnerability Exposure (CVE) ID: CVE-2008-1945
RedHat Security Advisories: RHSA-2008:0892
https://rhn.redhat.com/errata/RHSA-2008-0892.html
BugTraq ID: 30604
http://www.securityfocus.com/bid/30604
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9905
http://www.securitytracker.com/id?1020959
http://secunia.com/advisories/32063
http://secunia.com/advisories/32088
XForce ISS Database: qemu-image-security-bypass(44269)
http://xforce.iss.net/xforce/xfdb/44269
Common Vulnerability Exposure (CVE) ID: CVE-2009-1464
Bugtraq: 20090512 Syhunt: A-A-S (Application Access Server) Multiple Security Vulnerabilities (Google Search)
http://www.securityfocus.com/archive/1/archive/1/503434/100/0/threaded
http://www.syhunt.com/advisories/?id=aas-multiple
http://www.syhunt.com/advisories/aashack.txt
BugTraq ID: 34911
http://www.securityfocus.com/bid/34911
http://securitytracker.com/id?1022204
http://secunia.com/advisories/35034
Common Vulnerability Exposure (CVE) ID: CVE-2009-1465
XForce ISS Database: aas-default-password(50589)
http://xforce.iss.net/xforce/xfdb/50589
Common Vulnerability Exposure (CVE) ID: CVE-2009-1466
XForce ISS Database: aas-aas-info-disclosure(50590)
http://xforce.iss.net/xforce/xfdb/50590
Common Vulnerability Exposure (CVE) ID: CVE-2009-0042
Bugtraq: 20090127 CA20090126-01: CA Anti-Virus Engine Detection Evasion Multiple Vulnerabilities (Google Search)
http://www.securityfocus.com/archive/1/archive/1/500417/100/0/threaded
BugTraq ID: 33464
http://www.securityfocus.com/bid/33464
http://www.vupen.com/english/advisories/2009/0270
http://www.securitytracker.com/id?1021639
XForce ISS Database: ca-antivirus-engine-security-bypass(48261)
http://xforce.iss.net/xforce/xfdb/48261
Common Vulnerability Exposure (CVE) ID: CVE-2009-1131
Bugtraq: 20090512 Secunia Research: Microsoft PowerPoint Atom Parsing Buffer Overflows (Google Search)
http://www.securityfocus.com/archive/1/503451
http://secunia.com/secunia_research/2008-46/
Microsoft Security Bulletin: MS09-017
http://www.microsoft.com/technet/security/Bulletin/MS09-017.mspx
Cert/CC Advisory: TA09-132A
http://www.us-cert.gov/cas/techalerts/TA09-132A.html
BugTraq ID: 34841
http://www.securityfocus.com/bid/34841
http://osvdb.org/54393
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:5351
http://www.securitytracker.com/id?1022205
http://secunia.com/advisories/32428
http://www.vupen.com/english/advisories/2009/1290
Common Vulnerability Exposure (CVE) ID: CVE-2009-0556
Bugtraq: 20090512 ZDI-09-019: Microsoft Office PowerPoint OutlineTextRefAtom Parsing Memory Corruption Vulnerability (Google Search)
http://www.securityfocus.com/archive/1/archive/1/503453/100/0/threaded
http://www.zerodayinitiative.com/advisories/ZDI-09-019
CERT/CC vulnerability note: VU#627331
http://www.kb.cert.org/vuls/id/627331
BugTraq ID: 34351
http://www.securityfocus.com/bid/34351
http://osvdb.org/53182
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6204
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6279
http://www.securitytracker.com/id?1021967
http://secunia.com/advisories/34572
http://www.vupen.com/english/advisories/2009/0915
XForce ISS Database: powerpoint-unspecified-code-execution(49632)
http://xforce.iss.net/xforce/xfdb/49632
Common Vulnerability Exposure (CVE) ID: CVE-2009-1130
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=794
Bugtraq: 20090512 ZDI-09-020: Microsoft Office PowerPoint Notes Container Heap Overflow Vulnerability (Google Search)
http://www.securityfocus.com/archive/1/503454
http://www.zerodayinitiative.com/advisories/ZDI-09-020/
BugTraq ID: 34840
http://www.securityfocus.com/bid/34840
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:5961
Common Vulnerability Exposure (CVE) ID: CVE-2009-0227
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=787
BugTraq ID: 34882
http://www.securityfocus.com/bid/34882
http://osvdb.org/54384
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6239
Common Vulnerability Exposure (CVE) ID: CVE-2009-0223
BugTraq ID: 34834
http://www.securityfocus.com/bid/34834
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:6269
Common Vulnerability Exposure (CVE) ID: CVE-2009-0220
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=790
BugTraq ID: 34833
http://www.securityfocus.com/bid/34833
http://osvdb.org/54386
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:5610
Common Vulnerability Exposure (CVE) ID: CVE-2009-1128
BugTraq ID: 34837
http://www.securityfocus.com/bid/34837
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:5416
CopyrightCopyright (c) 2009 E-Soft Inc. http://www.securityspace.com

This is only one of 39644 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

New User Registration
Email:
UserID:
Passwd:
Please email me your monthly newsletters, informing the latest services, improvements & surveys.
Please email me a vulnerability test announcement whenever a new test is added.
   Privacy
Registered User Login
 
UserID:   
Passwd:  

 Forgot userid or passwd?
Email/Userid:




Home | About Us | Contact Us | Partner Programs | Privacy | Mailing Lists | Abuse
Security Audits | Managed DNS | Network Monitoring | Site Analyzer | Internet Research Reports
Web Probe | Whois

© 1998-2014 E-Soft Inc. All rights reserved.