Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | |||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.801030 |
Categoría: | Denial of Service |
Título: | Pidgin Oscar Protocol Denial of Service Vulnerability (Windows) |
Resumen: | This host has Pidgin installed and is prone to Denial of Service; vulnerability. |
Descripción: | Summary: This host has Pidgin installed and is prone to Denial of Service vulnerability. Vulnerability Insight: This issue is caused by an error in the Oscar protocol plugin when processing malformed ICQ or AIM contacts sent by the SIM IM client, which could cause an invalid memory access leading to a crash. Vulnerability Impact: Successful exploitation will allow attacker to cause a Denial of Service. Affected Software/OS: Pidgin version prior to 2.6.3 on Windows. Solution: Upgrade to Pidgin version 2.6.3. CVSS Score: 5.0 CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P |
Referencia Cruzada: |
BugTraq ID: 36719 Common Vulnerability Exposure (CVE) ID: CVE-2009-3615 http://www.securityfocus.com/bid/36719 http://www.mandriva.com/security/advisories?name=MDVSA-2010:085 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18388 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9414 http://secunia.com/advisories/37017 http://secunia.com/advisories/37072 http://www.vupen.com/english/advisories/2009/2949 http://www.vupen.com/english/advisories/2009/2951 http://www.vupen.com/english/advisories/2010/1020 XForce ISS Database: pidgin-oscar-protocol-dos(53807) https://exchange.xforce.ibmcloud.com/vulnerabilities/53807 |
Copyright | Copyright (C) 2009 Greenbone Networks GmbH |
Esta es sólo una de 99761 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |