Search 219043 CVE descriptions
and 99761 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:
Category:Mandrake Local Security Checks
Title:Mandriva Security Advisory MDVSA-2011:178 (glibc)
The remote host is missing an update to glibc
announced via advisory MDVSA-2011:178.

Multiple vulnerabilities was discovered and fixed in glibc:

Multiple untrusted search path vulnerabilities in elf/dl-object.c in
certain modified versions of the GNU C Library (aka glibc or libc6),
including glibc-2.5-49.el5_5.6 and glibc-2.12-1.7.el6_0.3 in Red Hat
Enterprise Linux, allow local users to gain privileges via a crafted
dynamic shared object (DSO) in a subdirectory of the current working
directory during execution of a (1) setuid or (2) setgid program that
has in (a) RPATH or (b) RUNPATH. NOTE: this issue exists because
of an incorrect fix for CVE-2010-3847 (CVE-2011-0536).

The GNU C Library (aka glibc or libc6) before 2.12.2 and Embedded GLIBC
(EGLIBC) allow context-dependent attackers to execute arbitrary code
or cause a denial of service (memory consumption) via a long UTF8
string that is used in an fnmatch call, aka a stack extension attack,
a related issue to CVE-2010-2898, as originally reported for use of
this library by Google Chrome (CVE-2011-1071).

The addmntent function in the GNU C Library (aka glibc or libc6) 2.13
and earlier does not report an error status for failed attempts to
write to the /etc/mtab file, which makes it easier for local users
to trigger corruption of this file, as demonstrated by writes from
a process with a small RLIMIT_FSIZE value, a different vulnerability
than CVE-2010-0296 (CVE-2011-1089).

locale/programs/locale.c in locale in the GNU C Library (aka glibc
or libc6) before 2.13 does not quote its output, which might allow
local users to gain privileges via a crafted localization environment
variable, in conjunction with a program that executes a script that
uses the eval function (CVE-2011-1095).

Integer overflow in posix/fnmatch.c in the GNU C Library (aka glibc or
libc6) 2.13 and earlier allows context-dependent attackers to cause a
denial of service (application crash) via a long UTF8 string that is
used in an fnmatch call with a crafted pattern argument, a different
vulnerability than CVE-2011-1071 (CVE-2011-1659).

crypt_blowfish before 1.1, as used in glibc on certain platforms,
does not properly handle 8-bit characters, which makes it easier
for context-dependent attackers to determine a cleartext password by
leveraging knowledge of a password hash (CVE-2011-2483).

The updated packages have been patched to correct these issues.

Affected: 2010.1, Enterprise Server 5.0

To upgrade automatically use MandrakeUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

Risk factor : High

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2010-3847
BugTraq ID: 44154
Bugtraq: 20110105 VMSA-2011-0001 VMware ESX third party updates for Service Console packages glibc, sudo, and openldap (Google Search)
CERT/CC vulnerability note: VU#537223
Debian Security Information: DSA-2122 (Google Search)
RedHat Security Advisories: RHSA-2010:0787
SuSE Security Announcement: SUSE-SA:2010:052 (Google Search)
Common Vulnerability Exposure (CVE) ID: CVE-2011-0536
Bugtraq: 20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console (Google Search)
Debian Security Information: DSA-2122-2 (Google Search)
Common Vulnerability Exposure (CVE) ID: CVE-2010-2898
Common Vulnerability Exposure (CVE) ID: CVE-2011-1071
BugTraq ID: 46563
Common Vulnerability Exposure (CVE) ID: CVE-2010-0296
Bugtraq: 20190613 SEC Consult SA-20190612-0 :: Multiple vulnerabilities in WAGO 852 Industrial Managed Switch Series (Google Search)
Debian Security Information: DSA-2058 (Google Search)
XForce ISS Database: gnuclibrary-encodenamemacro-dos(59240)
Common Vulnerability Exposure (CVE) ID: CVE-2011-1089
BugTraq ID: 46740
Common Vulnerability Exposure (CVE) ID: CVE-2011-1095
Common Vulnerability Exposure (CVE) ID: CVE-2011-1659
XForce ISS Database: gnuclibrary-fnmatch-dos(66819)
Common Vulnerability Exposure (CVE) ID: CVE-2011-2483
BugTraq ID: 49241
Debian Security Information: DSA-2340 (Google Search)
Debian Security Information: DSA-2399 (Google Search)
SuSE Security Announcement: SUSE-SA:2011:035 (Google Search)
XForce ISS Database: php-cryptblowfish-info-disclosure(69319)
CopyrightCopyright (c) 2012 E-Soft Inc.

This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

© 1998-2022 E-Soft Inc. All rights reserved.