Búsqueda de    
Vulnerabilidad   
    Buscar 219043 Descripciones CVE y
99761 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.881491
Categoría:CentOS Local Security Checks
Título:CentOS Update for libxslt CESA-2012:1265 centos5
Resumen:The remote host is missing an update for the 'libxslt'; package(s) announced via the referenced advisory.
Descripción:Summary:
The remote host is missing an update for the 'libxslt'
package(s) announced via the referenced advisory.

Vulnerability Insight:
libxslt is a library for transforming XML files into other textual formats
(including HTML, plain text, and other XML representations of the
underlying data) using the standard XSLT stylesheet transformation
mechanism.

A heap-based buffer overflow flaw was found in the way libxslt applied
templates to nodes selected by certain namespaces. An attacker could use
this flaw to create a malicious XSL file that, when used by an application
linked against libxslt to perform an XSL transformation, could cause the
application to crash or, possibly, execute arbitrary code with the
privileges of the user running the application. (CVE-2012-2871)

Several denial of service flaws were found in libxslt. An attacker could
use these flaws to create a malicious XSL file that, when used by an
application linked against libxslt to perform an XSL transformation, could
cause the application to crash. (CVE-2012-2825, CVE-2012-2870,
CVE-2011-3970)

An information leak could occur if an application using libxslt processed
an untrusted XPath expression, or used a malicious XSL file to perform an
XSL transformation. If combined with other flaws, this leak could possibly
help an attacker bypass intended memory corruption protections.
(CVE-2011-1202)

All libxslt users are advised to upgrade to these updated packages, which
contain backported patches to resolve these issues. All running
applications linked against libxslt must be restarted for this update to
take effect.

Affected Software/OS:
libxslt on CentOS 5

Solution:
Please install the updated packages.

CVSS Score:
6.8

CVSS Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2011-1202
BugTraq ID: 46785
http://www.securityfocus.com/bid/46785
http://www.mandriva.com/security/advisories?name=MDVSA-2011:079
http://www.mandriva.com/security/advisories?name=MDVSA-2012:164
http://scarybeastsecurity.blogspot.com/2011/03/multi-browser-heap-address-leak-in-xslt.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14244
http://www.vupen.com/english/advisories/2011/0628
XForce ISS Database: google-xslt-info-disclosure(65966)
https://exchange.xforce.ibmcloud.com/vulnerabilities/65966
Common Vulnerability Exposure (CVE) ID: CVE-2011-3970
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14818
SuSE Security Announcement: SUSE-SU-2013:1654 (Google Search)
https://www.suse.com/support/update/announcement/2013/suse-su-20131654-1.html
SuSE Security Announcement: SUSE-SU-2013:1656 (Google Search)
https://www.suse.com/support/update/announcement/2013/suse-su-20131656-1.html
Common Vulnerability Exposure (CVE) ID: CVE-2012-2825
http://lists.apple.com/archives/security-announce/2013/Sep/msg00006.html
http://lists.apple.com/archives/security-announce/2013/Oct/msg00009.html
http://secunia.com/advisories/54886
SuSE Security Announcement: openSUSE-SU-2012:0813 (Google Search)
https://hermes.opensuse.org/messages/15075728
Common Vulnerability Exposure (CVE) ID: CVE-2012-2870
Debian Security Information: DSA-2555 (Google Search)
http://www.debian.org/security/2012/dsa-2555
http://secunia.com/advisories/50838
SuSE Security Announcement: openSUSE-SU-2012:1215 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00030.html
Common Vulnerability Exposure (CVE) ID: CVE-2012-2871
XForce ISS Database: chrome-xsl-transforms-code-exec(78179)
https://exchange.xforce.ibmcloud.com/vulnerabilities/78179
CopyrightCopyright (c) 2012 Greenbone Networks GmbH

Esta es sólo una de 99761 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2024 E-Soft Inc. Todos los derechos reservados.