Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.67542
Category:Debian Local Security Checks
Title:Debian: Security Advisory (DSA-2058-1)
Summary:The remote host is missing an update for the Debian 'glibc' package(s) announced via the DSA-2058-1 advisory.
Description:Summary:
The remote host is missing an update for the Debian 'glibc' package(s) announced via the DSA-2058-1 advisory.

Vulnerability Insight:
Several vulnerabilities have been discovered in the GNU C Library (aka glibc) and its derivatives. The Common Vulnerabilities and Exposures project identifies the following problems:

CVE-2008-1391, CVE-2009-4880, CVE-2009-4881 Maksymilian Arciemowicz discovered that the GNU C library did not correctly handle integer overflows in the strfmon family of functions. If a user or automated system were tricked into processing a specially crafted format string, a remote attacker could crash applications, leading to a denial of service.

CVE-2010-0296

Jeff Layton and Dan Rosenberg discovered that the GNU C library did not correctly handle newlines in the mntent family of functions. If a local attacker were able to inject newlines into a mount entry through other vulnerable mount helpers, they could disrupt the system or possibly gain root privileges.

CVE-2010-0830

Dan Rosenberg discovered that the GNU C library did not correctly validate certain ELF program headers. If a user or automated system were tricked into verifying a specially crafted ELF program, a remote attacker could execute arbitrary code with user privileges.

For the stable distribution (lenny), these problems have been fixed in version 2.7-18lenny4 of the glibc package.

For the testing distribution (squeeze), these problems will be fixed soon.

For the unstable distribution (sid), these problems has been fixed in version 2.1.11-1 of the eglibc package.

We recommend that you upgrade your glibc or eglibc packages.

Affected Software/OS:
'glibc' package(s) on Debian 5.

Solution:
Please install the updated package(s).

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2008-1391
http://lists.apple.com/archives/security-announce//2008//Dec/msg00000.html
BugTraq ID: 28479
http://www.securityfocus.com/bid/28479
Bugtraq: 20080327 [securityreason] *BSD libc (strfmon) Multiple vulnerabilities (Google Search)
http://www.securityfocus.com/archive/1/490158/100/0/threaded
Cert/CC Advisory: TA08-350A
http://www.us-cert.gov/cas/techalerts/TA08-350A.html
Debian Security Information: DSA-2058 (Google Search)
http://www.debian.org/security/2010/dsa-2058
http://www.securitytracker.com/id?1019722
http://secunia.com/advisories/29574
http://secunia.com/advisories/33179
http://securityreason.com/securityalert/3770
http://securityreason.com/achievement_securityalert/53
SuSE Security Announcement: SUSE-SA:2010:052 (Google Search)
https://lists.opensuse.org/opensuse-security-announce/2010-10/msg00007.html
http://www.vupen.com/english/advisories/2008/3444
XForce ISS Database: bsd-strfmon-overflow(41504)
https://exchange.xforce.ibmcloud.com/vulnerabilities/41504
Common Vulnerability Exposure (CVE) ID: CVE-2009-4880
BugTraq ID: 36443
http://www.securityfocus.com/bid/36443
http://security.gentoo.org/glsa/glsa-201011-01.xml
http://www.mandriva.com/security/advisories?name=MDVSA-2010:111
http://www.mandriva.com/security/advisories?name=MDVSA-2010:112
https://bugzilla.redhat.com/show_bug.cgi?id=524671
http://secunia.com/advisories/39900
http://securityreason.com/achievement_securityalert/67
http://www.ubuntu.com/usn/USN-944-1
http://www.vupen.com/english/advisories/2010/1246
XForce ISS Database: gnuclibrary-strfmon-overflow(59242)
https://exchange.xforce.ibmcloud.com/vulnerabilities/59242
Common Vulnerability Exposure (CVE) ID: CVE-2009-4881
XForce ISS Database: gnuclibrary-vstrfmonl-overflow(59241)
https://exchange.xforce.ibmcloud.com/vulnerabilities/59241
Common Vulnerability Exposure (CVE) ID: CVE-2010-0296
1024043
http://securitytracker.com/id?1024043
20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console
http://www.securityfocus.com/archive/1/520102/100/0/threaded
20190612 SEC Consult SA-20190612-0 :: Multiple vulnerabilities in WAGO 852 Industrial Managed Switch Series
http://seclists.org/fulldisclosure/2019/Jun/18
20190613 SEC Consult SA-20190612-0 :: Multiple vulnerabilities in WAGO 852 Industrial Managed Switch Series
https://seclists.org/bugtraq/2019/Jun/14
39900
43830
http://secunia.com/advisories/43830
46397
http://secunia.com/advisories/46397
ADV-2010-1246
ADV-2011-0863
http://www.vupen.com/english/advisories/2011/0863
DSA-2058
GLSA-201011-01
MDVSA-2010:111
MDVSA-2010:112
RHSA-2011:0412
http://www.redhat.com/support/errata/RHSA-2011-0412.html
SUSE-SA:2010:052
USN-944-1
gnuclibrary-encodenamemacro-dos(59240)
https://exchange.xforce.ibmcloud.com/vulnerabilities/59240
http://frugalware.org/security/662
http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html
http://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=ab00f4eac8f4932211259ff87be83144f5211540
http://www.vmware.com/security/advisories/VMSA-2011-0012.html
https://bugzilla.redhat.com/show_bug.cgi?id=559579
Common Vulnerability Exposure (CVE) ID: CVE-2010-0830
BugTraq ID: 40063
http://www.securityfocus.com/bid/40063
http://drosenbe.blogspot.com/2010/05/integer-overflow-in-ldso-cve-2010-0830.html
http://securitytracker.com/id?1024044
XForce ISS Database: glibc-elf-code-execution(58915)
https://exchange.xforce.ibmcloud.com/vulnerabilities/58915
CopyrightCopyright (C) 2010 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.