![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.72082 |
Category: | Mandrake Local Security Checks |
Title: | Mandriva Security Advisory MDVSA-2011:190 (libarchive) |
Summary: | NOSUMMARY |
Description: | Description: The remote host is missing an update to libarchive announced via advisory MDVSA-2011:190. Two heap-based buffer overflow flaws were discovered in libarchive. If a user were tricked into expanding a specially-crafted ISO 9660 CD-ROM image or tar archive with an application using libarchive, it could cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application (CVE-2011-1777, CVE-2011-1778). The updated packages have been patched to correct these issues. Affected: 2010.1, 2011. Solution: To upgrade automatically use MandrakeUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. http://www.securityspace.com/smysecure/catid.html?in=MDVSA-2011:190 Risk factor : High |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2011-1777 48034 http://secunia.com/advisories/48034 APPLE-SA-2012-05-09-1 http://lists.apple.com/archives/security-announce/2012/May/msg00001.html DSA-2413 http://www.debian.org/security/2012/dsa-2413 RHSA-2011:1507 https://rhn.redhat.com/errata/RHSA-2011-1507.html http://code.google.com/p/libarchive/source/detail?r=3158 http://support.apple.com/kb/HT5281 https://bugzilla.redhat.com/show_bug.cgi?id=705849 Common Vulnerability Exposure (CVE) ID: CVE-2011-1778 http://code.google.com/p/libarchive/source/detail?r=3160 |
Copyright | Copyright (c) 2012 E-Soft Inc. http://www.securityspace.com |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |