Anfälligkeitssuche        Suche in 219043 CVE Beschreibungen
und 99761 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.881694
Kategorie:CentOS Local Security Checks
Titel:CentOS Update for boost CESA-2013:0668 centos5
Zusammenfassung:The remote host is missing an update for the 'boost'; package(s) announced via the referenced advisory.
Beschreibung:Summary:
The remote host is missing an update for the 'boost'
package(s) announced via the referenced advisory.

Vulnerability Insight:
The boost packages provide free, peer-reviewed, portable C++ source
libraries with emphasis on libraries which work well with the C++ Standard
Library.

A flaw was found in the way the ordered_malloc() routine in Boost sanitized
the 'next_size' and 'max_size' parameters when allocating memory. If an
application used the Boost C++ libraries for memory allocation, and
performed memory allocation based on user-supplied input, an attacker could
use this flaw to crash the application or, potentially, execute arbitrary
code with the privileges of the user running the application.
(CVE-2012-2677)

All users of boost are advised to upgrade to these updated packages, which
contain a backported patch to fix this issue.

Affected Software/OS:
boost on CentOS 5

Solution:
Please install the updated packages.

CVSS Score:
5.0

CVSS Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:P

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2012-2677
http://lists.fedoraproject.org/pipermail/package-announce/2012-July/083416.html
http://lists.fedoraproject.org/pipermail/package-announce/2012-June/082977.html
https://security.gentoo.org/glsa/202105-04
http://www.mandriva.com/security/advisories?name=MDVSA-2013:065
http://kqueue.org/blog/2012/03/05/memory-allocator-security-revisited/
http://www.openwall.com/lists/oss-security/2012/06/05/1
http://www.openwall.com/lists/oss-security/2012/06/07/13
CopyrightCopyright (c) 2013 Greenbone Networks GmbH

Dies ist nur einer von 99761 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2024 E-Soft Inc. Alle Rechte vorbehalten.