Anfälligkeitssuche        Suche in 219043 CVE Beschreibungen
und 99761 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.702911
Kategorie:Debian Local Security Checks
Titel:Debian Security Advisory DSA 2911-1 (icedove - security update)
Zusammenfassung:Multiple security issues have been found in Icedove, Debian's version of;the Mozilla Thunderbird mail and news client. Multiple memory safety;errors, out of bound reads, use-after-frees and other implementation;errors may lead to the execution of arbitrary code, information;disclosure or denial of service.
Beschreibung:Summary:
Multiple security issues have been found in Icedove, Debian's version of
the Mozilla Thunderbird mail and news client. Multiple memory safety
errors, out of bound reads, use-after-frees and other implementation
errors may lead to the execution of arbitrary code, information
disclosure or denial of service.

Affected Software/OS:
icedove on Debian Linux

Solution:
For the stable distribution (wheezy), these problems have been fixed in
version 24.4.0-1~
deb7u1. This updates Icedove to the Extended Support
Release (ESR) branch 24. An updated and compatible version of Enigmail
is included with this update.

For the testing distribution (jessie), these problems have been fixed in
version 24.4.0-1.

For the unstable distribution (sid), these problems have been fixed in
version 24.4.0-1.

We recommend that you upgrade your icedove packages.

CVSS Score:
10.0

CVSS Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2014-1493
BugTraq ID: 66412
http://www.securityfocus.com/bid/66412
Debian Security Information: DSA-2881 (Google Search)
http://www.debian.org/security/2014/dsa-2881
Debian Security Information: DSA-2911 (Google Search)
http://www.debian.org/security/2014/dsa-2911
https://security.gentoo.org/glsa/201504-01
RedHat Security Advisories: RHSA-2014:0310
http://rhn.redhat.com/errata/RHSA-2014-0310.html
RedHat Security Advisories: RHSA-2014:0316
http://rhn.redhat.com/errata/RHSA-2014-0316.html
SuSE Security Announcement: SUSE-SU-2014:0418 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00016.html
SuSE Security Announcement: openSUSE-SU-2014:0419 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00017.html
SuSE Security Announcement: openSUSE-SU-2014:0448 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00022.html
SuSE Security Announcement: openSUSE-SU-2014:0584 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00016.html
http://www.ubuntu.com/usn/USN-2151-1
Common Vulnerability Exposure (CVE) ID: CVE-2014-1497
BugTraq ID: 66423
http://www.securityfocus.com/bid/66423
Common Vulnerability Exposure (CVE) ID: CVE-2014-1505
BugTraq ID: 66418
http://www.securityfocus.com/bid/66418
Common Vulnerability Exposure (CVE) ID: CVE-2014-1508
BugTraq ID: 66426
http://www.securityfocus.com/bid/66426
Common Vulnerability Exposure (CVE) ID: CVE-2014-1510
BugTraq ID: 66206
http://www.securityfocus.com/bid/66206
Common Vulnerability Exposure (CVE) ID: CVE-2014-1511
BugTraq ID: 66207
http://www.securityfocus.com/bid/66207
Common Vulnerability Exposure (CVE) ID: CVE-2014-1512
BugTraq ID: 66209
http://www.securityfocus.com/bid/66209
Bugtraq: 20140326 VUPEN Security Research - Mozilla Firefox "BumpChunk" Object Processing Use-after-free (Pwn2Own) (Google Search)
http://archives.neohapsis.com/archives/bugtraq/2014-03/0145.html
Common Vulnerability Exposure (CVE) ID: CVE-2014-1513
BugTraq ID: 66203
http://www.securityfocus.com/bid/66203
Common Vulnerability Exposure (CVE) ID: CVE-2014-1514
BugTraq ID: 66240
http://www.securityfocus.com/bid/66240
CopyrightCopyright (C) 2014 Greenbone Networks GmbH http://greenbone.net

Dies ist nur einer von 99761 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2024 E-Soft Inc. Alle Rechte vorbehalten.