Startseite ▼ Bookkeeping
Online ▼ Sicherheits
Überprüfungs ▼
Verwaltetes
DNS ▼
Info
Bestellen/Erneuern
FAQ
AUP
Dynamic DNS Clients
Domaine konfigurieren Dyanmic DNS Update Password Netzwerk
Überwachung ▼
Enterprise
Erweiterte
Standard
Gratis Test
FAQ
Preis/Funktionszusammenfassung
Bestellen
Beispiele
Konfigurieren/Status Alarm Profile | |||
Test Kennung: | 1.3.6.1.4.1.25623.1.0.70702 |
Kategorie: | Debian Local Security Checks |
Titel: | Debian Security Advisory DSA 2383-1 (super) |
Zusammenfassung: | The remote host is missing an update to super;announced via advisory DSA 2383-1. |
Beschreibung: | Summary: The remote host is missing an update to super announced via advisory DSA 2383-1. Vulnerability Insight: Robert Luberda discovered a buffer overflow in the syslog logging code of Super, a tool to execute scripts (or other commands) as if they were root. The default Debian configuration is not affected. For the oldstable distribution (lenny), this problem has been fixed in version 3.30.0-2+lenny1. Due to a technical limitation in the Debian archive scripts this update cannot be released synchronously with the stable update. It will be available shortly. For the stable distribution (squeeze), this problem has been fixed in version 3.30.0-3+squeeze1. For the unstable distribution (sid), this problem will be fixed soon. Solution: We recommend that you upgrade your super packages. CVSS Score: 4.4 CVSS Vector: AV:L/AC:M/Au:N/C:P/I:P/A:P |
Querverweis: |
Common Vulnerability Exposure (CVE) ID: CVE-2011-2776 BugTraq ID: 51319 http://www.securityfocus.com/bid/51319 Debian Security Information: DSA-2383 (Google Search) http://www.debian.org/security/2012/dsa-2383 http://osvdb.org/78213 http://secunia.com/advisories/47430 http://secunia.com/advisories/47514 XForce ISS Database: super-error-bo(72243) https://exchange.xforce.ibmcloud.com/vulnerabilities/72243 |
Copyright | Copyright (c) 2012 E-Soft Inc. http://www.securityspace.com |
Dies ist nur einer von 99761 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus. Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten. |