Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | |||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.58005 |
Categoría: | Mandrake Local Security Checks |
Título: | Mandrake Security Advisory MDKSA-2007:039 (gtk+2.0) |
Resumen: | NOSUMMARY |
Descripción: | Description: The remote host is missing an update to gtk+2.0 announced via advisory MDKSA-2007:039. The GdkPixbufLoader function in GIMP ToolKit (GTK+) in GTK 2 (gtk2) allows context-dependent attackers to cause a denial of service (crash) via a malformed image file. (CVE-2007-0010) The version of libgtk+2.0 shipped with Mandriva Linux 2007 fails various portions of the lsb-test-desktop test suite, part of LSB 3.1 certification testing. The updated packages also address the following issues: The Home and Desktop entries in the GTK File Chooser are not always visible (#26644). GTK+-based applications (which includes all the Mandriva Linux configuration tools, for example) crash (instead of falling back to the default theme) when an invalid icon theme is selected. (#27013) Additional patches from GNOME CVS have been included to address the following issues from the GNOME bugzilla: * 357132 - fix RGBA colormap issue * 359537,357280,359052 - fix various printer bugs * 357566,353736,357050,363437,379503 - fix various crashes * 372527 - fix fileselector bug + potential deadlock Affected: 2007.0, Corporate 3.0, Corporate 4.0 Solution: To upgrade automatically use MandrakeUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. http://www.securityspace.com/smysecure/catid.html?in=MDKSA-2007:039 http://qa.mandriva.com/show_bug.cgi?id=26644 http://qa.mandriva.com/show_bug.cgi?id=27013 Risk factor : Medium CVSS Score: 2.1 |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2007-0010 BugTraq ID: 22209 http://www.securityfocus.com/bid/22209 Debian Security Information: DSA-1256 (Google Search) https://www.debian.org/security/2007/dsa-1256 http://www.mandriva.com/security/advisories?name=MDKSA-2007:039 http://osvdb.org/31621 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10325 http://www.redhat.com/support/errata/RHSA-2007-0019.html http://securitytracker.com/id?1017552 http://secunia.com/advisories/23884 http://secunia.com/advisories/23933 http://secunia.com/advisories/23935 http://secunia.com/advisories/23984 http://secunia.com/advisories/24006 http://secunia.com/advisories/24010 http://secunia.com/advisories/24095 SuSE Security Announcement: SUSE-SR:2007:002 (Google Search) http://www.novell.com/linux/security/advisories/2007_02_sr.html http://www.ubuntu.com/usn/usn-415-1 http://www.vupen.com/english/advisories/2007/0331 |
Copyright | Copyright (c) 2007 E-Soft Inc. http://www.securityspace.com |
Esta es sólo una de 99761 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |