Anfälligkeitssuche        Suche in 219043 CVE Beschreibungen
und 99761 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.703146
Kategorie:Debian Local Security Checks
Titel:Debian Security Advisory DSA 3146-1 (requests - security update)
Zusammenfassung:Jakub Wilk discovered that in requests,;an HTTP library for the Python language, authentication information was improperly;handled when a redirect occurred. This would allow remote servers to obtain two;different types of sensitive information: proxy passwords from the;Proxy-Authorization header (CVE-2014-1830), or netrc passwords from the;Authorization header (CVE-2014-1829).
Beschreibung:Summary:
Jakub Wilk discovered that in requests,
an HTTP library for the Python language, authentication information was improperly
handled when a redirect occurred. This would allow remote servers to obtain two
different types of sensitive information: proxy passwords from the
Proxy-Authorization header (CVE-2014-1830), or netrc passwords from the
Authorization header (CVE-2014-1829).

Affected Software/OS:
requests on Debian Linux

Solution:
For the stable distribution (wheezy),
this problem has been fixed in version 0.12.1-1+deb7u1.

For the upcoming stable distribution (jessie) and unstable
distribution (sid), this problem has been fixed in version 2.3.0-1.

We recommend that you upgrade your requests packages.

CVSS Score:
5.0

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:N/A:N

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2014-1829
Debian Security Information: DSA-3146 (Google Search)
http://www.debian.org/security/2015/dsa-3146
http://www.mandriva.com/security/advisories?name=MDVSA-2015:133
http://www.ubuntu.com/usn/USN-2382-1
Common Vulnerability Exposure (CVE) ID: CVE-2014-1830
SuSE Security Announcement: openSUSE-SU-2016:0246 (Google Search)
http://lists.opensuse.org/opensuse-updates/2016-01/msg00095.html
CopyrightCopyright (c) 2015 Greenbone Networks GmbH http://greenbone.net

Dies ist nur einer von 99761 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2024 E-Soft Inc. Alle Rechte vorbehalten.