Anfälligkeitssuche        Suche in 219043 CVE Beschreibungen
und 99761 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.52128
Kategorie:FreeBSD Local Security Checks
Titel:FreeBSD Ports: junkbuster
Zusammenfassung:NOSUMMARY
Beschreibung:Description:
The remote host is missing an update to the system
as announced in the referenced advisory.

The following packages are affected:
junkbuster
junkbuster-zlib

CVE-2005-1108
The ij_untrusted_url function in JunkBuster 2.0.2-r2, with
single-threaded mode enabled, allows remote attackers to overwrite the
referrer field via a crafted HTTP request.

CVE-2005-1109
The filtering of URLs in JunkBuster before 2.0.2-r3 allows remote
attackers to cause a denial of service (application crash) and
possibly execute arbitrary code via heap corruption.

Solution:
Update your system with the appropriate patches or
software upgrades.

http://www.debian.org/security/2005/dsa-713
http://www.gentoo.org/security/en/glsa/glsa-200504-11.xml
http://www.vuxml.org/freebsd/97edf5ab-b319-11d9-837d-000e0c2e438a.html

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Querverweis: BugTraq ID: 13146
BugTraq ID: 13147
Common Vulnerability Exposure (CVE) ID: CVE-2005-1108
http://www.securityfocus.com/bid/13147
Debian Security Information: DSA-713 (Google Search)
http://www.debian.org/security/2005/dsa-713
http://www.gentoo.org/security/en/glsa/glsa-200504-11.xml
http://bugs.gentoo.org/show_bug.cgi?id=88537
http://www.osvdb.org/15502
http://secunia.com/advisories/14932/
XForce ISS Database: junkbuster-ijuntrustedurl-gain-access(20093)
https://exchange.xforce.ibmcloud.com/vulnerabilities/20093
Common Vulnerability Exposure (CVE) ID: CVE-2005-1109
http://www.securityfocus.com/bid/13146
http://www.osvdb.org/15503
XForce ISS Database: junkbuster-heap-corruption(20094)
https://exchange.xforce.ibmcloud.com/vulnerabilities/20094
CopyrightCopyright (c) 2005 E-Soft Inc. http://www.securityspace.com

Dies ist nur einer von 99761 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2024 E-Soft Inc. Alle Rechte vorbehalten.