Anfälligkeitssuche        Suche in 219043 CVE Beschreibungen
und 99761 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.52094
Kategorie:Red Hat Local Security Checks
Titel:RedHat Security Advisory RHSA-2005:392
Zusammenfassung:NOSUMMARY
Beschreibung:Description:

The remote host is missing updates announced in
advisory RHSA-2005:392.

HelixPlayer is a media player.

A buffer overflow bug was found in the way HelixPlayer processes RAM files.
An attacker could create a specially crafted RAM file which could execute
arbitrary code when opened by a user. The Common Vulnerabilities and
Exposures project (cve.mitre.org) has assigned the name CVE-2005-0755 to
this issue.

All users of HelixPlayer are advised to upgrade to this updated package,
which contains HelixPlayer version 10.0.4 and is not vulnerable to this
issue.

Solution:
Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date

http://rhn.redhat.com/errata/RHSA-2005-392.html
http://service.real.com/help/faq/security/050419_player/EN/
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0755

Risk factor : High

CVSS Score:
5.1

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2005-0755
Bugtraq: 20050420 RealNetworks RealPlayer/RealOne Player/Helix Player Remote Heap Overflow (Google Search)
http://marc.info/?l=bugtraq&m=111401615202987&w=2
http://www.redhat.com/archives/fedora-announce-list/2005-April/msg00040.html
http://pb.specialised.info/all/adv/real-ram-adv.txt
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11205
http://www.redhat.com/support/errata/RHSA-2005-363.html
http://www.redhat.com/support/errata/RHSA-2005-392.html
http://www.redhat.com/support/errata/RHSA-2005-394.html
CopyrightCopyright (c) 2005 E-Soft Inc. http://www.securityspace.com

Dies ist nur einer von 99761 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2024 E-Soft Inc. Alle Rechte vorbehalten.