Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | |||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.131307 |
Categoría: | Mageia Linux Local Security Checks |
Título: | Mageia Linux Local Check: mgasa-2016-0140 |
Resumen: | Mageia Linux Local Security Checks mgasa-2016-0140 |
Descripción: | Summary: Mageia Linux Local Security Checks mgasa-2016-0140 Vulnerability Insight: Updated imlib2 packages fix security vulnerabilities: An out-of-bounds read caused by an off-by-one error in __imlib_MergeUpdate() in src/lib/updates.c in imlib2 1.4.8 and earlier (CVE-2016-3993). An out-of-bounds read from colormap in the GIF loader in imlib2 1.4.8 and earlier can result in denial of service and potential host memory exposure (CVE-2016-3994). Attempting to draw a 2x1 ellipse with e.g. imlib_image_draw_ellipse(x, y, 2, 1) causes a divide-by-zero in imlib2 1.4.8 and earlier, resulting in a denial of service if an application uses the draw command with untrusted input (CVE-2011-5326). Solution: Update the affected packages to the latest available version. CVSS Score: 6.4 CVSS Vector: AV:N/AC:L/Au:N/C:P/I:N/A:P |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2016-3993 Debian Security Information: DSA-3555 (Google Search) http://www.debian.org/security/2016/dsa-3555 https://sourceforge.net/p/enlightenment/mailman/message/35055012/ SuSE Security Announcement: openSUSE-SU-2016:1330 (Google Search) http://lists.opensuse.org/opensuse-updates/2016-05/msg00076.html Common Vulnerability Exposure (CVE) ID: CVE-2016-3994 Common Vulnerability Exposure (CVE) ID: CVE-2011-5326 |
Copyright | Copyright (C) 2016 Eero Volotinen |
Esta es sólo una de 99761 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |