Búsqueda de    
Vulnerabilidad   
    Buscar 219043 Descripciones CVE y
99761 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.50616
Categoría:Mandrake Local Security Checks
Título:Mandrake Security Advisory MDKSA-2004:137 (libxpm4)
Resumen:NOSUMMARY
Descripción:Description:

The remote host is missing an update to libxpm4
announced via advisory MDKSA-2004:137.

The XPM library which is part of the XFree86/XOrg project is used
by several GUI applications to process XPM image files.

A source code review of the XPM library, done by Thomas Biege of the
SuSE Security-Team revealed several different kinds of bugs. These bugs
include integer overflows, out-of-bounds memory access, shell command
execution, path traversal, and endless loops.

These bugs can be exploited by remote and/or local attackers to gain
access to the system or to escalate their local privileges, by using a
specially crafted xpm image.

Updated packages are patched to correct all these issues.

Affected versions: 10.0, 10.1, 9.2, Corporate Server 2.1

Solution:
To upgrade automatically use MandrakeUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

http://www.securityspace.com/smysecure/catid.html?in=MDKSA-2004:137
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0914

Risk factor : Critical

CVSS Score:
10.0

Referencia Cruzada: BugTraq ID: 11694
Common Vulnerability Exposure (CVE) ID: CVE-2004-0914
http://www.securityfocus.com/bid/11694
Debian Security Information: DSA-607 (Google Search)
http://www.debian.org/security/2004/dsa-607
http://www.linuxsecurity.com/content/view/106877/102/
http://www.redhat.com/archives/fedora-legacy-announce/2006-January/msg00001.html
http://www.gentoo.org/security/en/glsa/glsa-200411-28.xml
http://www.gentoo.org/security/en/glsa/glsa-200502-06.xml
http://www.gentoo.org/security/en/glsa/glsa-200502-07.xml
HPdes Security Advisory: HPSBTU01228
http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBTU01228
http://www.mandriva.com/security/advisories?name=MDKSA-2004:137
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9943
RedHat Security Advisories: RHSA-2004:537
http://rhn.redhat.com/errata/RHSA-2004-537.html
http://www.redhat.com/support/errata/RHSA-2004-610.html
http://www.redhat.com/support/errata/RHSA-2005-004.html
http://secunia.com/advisories/13224/
http://www.ubuntu.com/usn/usn-83-1
http://www.ubuntu.com/usn/usn-83-2
XForce ISS Database: libxpm-command-execution(18145)
https://exchange.xforce.ibmcloud.com/vulnerabilities/18145
XForce ISS Database: libxpm-directory-traversal(18146)
https://exchange.xforce.ibmcloud.com/vulnerabilities/18146
XForce ISS Database: libxpm-dos(18147)
https://exchange.xforce.ibmcloud.com/vulnerabilities/18147
XForce ISS Database: libxpm-image-bo(18142)
https://exchange.xforce.ibmcloud.com/vulnerabilities/18142
XForce ISS Database: libxpm-improper-memory-access(18144)
https://exchange.xforce.ibmcloud.com/vulnerabilities/18144
CopyrightCopyright (c) 2005 E-Soft Inc. http://www.securityspace.com

Esta es sólo una de 99761 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2024 E-Soft Inc. Todos los derechos reservados.