Anfälligkeitssuche        Suche in 187964 CVE Beschreibungen
und 85075 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.59004
Kategorie:Slackware Local Security Checks
Titel:Slackware Advisory SSA:2007-222-02 poppler
Zusammenfassung:The remote host is missing an update as announced;via advisory SSA:2007-222-02.
Beschreibung:Summary:
The remote host is missing an update as announced
via advisory SSA:2007-222-02.

Vulnerability Insight:
A new poppler package is available for Slackware 12.0 to fix an
integer overflow.

Solution:
Upgrade to the new package(s).

CVSS Score:
6.8

CVSS Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2007-3387
BugTraq ID: 25124
http://www.securityfocus.com/bid/25124
Bugtraq: 20070814 FLEA-2007-0044-1 tetex tetex-dvips tetex-fonts (Google Search)
http://www.securityfocus.com/archive/1/476508/100/0/threaded
Bugtraq: 20070814 FLEA-2007-0045-1 poppler (Google Search)
http://www.securityfocus.com/archive/1/476519/30/5400/threaded
Bugtraq: 20070816 FLEA-2007-0046-1 cups (Google Search)
http://www.securityfocus.com/archive/1/476765/30/5340/threaded
Debian Security Information: DSA-1347 (Google Search)
http://www.debian.org/security/2007/dsa-1347
Debian Security Information: DSA-1348 (Google Search)
http://www.debian.org/security/2007/dsa-1348
Debian Security Information: DSA-1349 (Google Search)
http://www.debian.org/security/2007/dsa-1349
Debian Security Information: DSA-1350 (Google Search)
http://www.debian.org/security/2007/dsa-1350
Debian Security Information: DSA-1352 (Google Search)
http://www.debian.org/security/2007/dsa-1352
Debian Security Information: DSA-1354 (Google Search)
http://www.debian.org/security/2007/dsa-1354
Debian Security Information: DSA-1355 (Google Search)
http://www.debian.org/security/2007/dsa-1355
Debian Security Information: DSA-1357 (Google Search)
http://www.debian.org/security/2007/dsa-1357
http://security.gentoo.org/glsa/glsa-200709-12.xml
http://security.gentoo.org/glsa/glsa-200709-17.xml
http://www.gentoo.org/security/en/glsa/glsa-200710-08.xml
http://security.gentoo.org/glsa/glsa-200710-20.xml
http://security.gentoo.org/glsa/glsa-200711-34.xml
http://security.gentoo.org/glsa/glsa-200805-13.xml
http://www.mandriva.com/security/advisories?name=MDKSA-2007:158
http://www.mandriva.com/security/advisories?name=MDKSA-2007:159
http://www.mandriva.com/security/advisories?name=MDKSA-2007:160
http://www.mandriva.com/security/advisories?name=MDKSA-2007:161
http://www.mandriva.com/security/advisories?name=MDKSA-2007:162
http://www.mandriva.com/security/advisories?name=MDKSA-2007:163
http://www.mandriva.com/security/advisories?name=MDKSA-2007:164
http://www.mandriva.com/security/advisories?name=MDKSA-2007:165
http://bugs.gentoo.org/show_bug.cgi?id=187139
http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=248194
http://osvdb.org/40127
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11149
http://www.redhat.com/support/errata/RHSA-2007-0720.html
http://www.redhat.com/support/errata/RHSA-2007-0729.html
http://www.redhat.com/support/errata/RHSA-2007-0730.html
http://www.redhat.com/support/errata/RHSA-2007-0731.html
http://www.redhat.com/support/errata/RHSA-2007-0732.html
http://www.redhat.com/support/errata/RHSA-2007-0735.html
http://www.securitytracker.com/id?1018473
http://secunia.com/advisories/26188
http://secunia.com/advisories/26251
http://secunia.com/advisories/26254
http://secunia.com/advisories/26255
http://secunia.com/advisories/26257
http://secunia.com/advisories/26278
http://secunia.com/advisories/26281
http://secunia.com/advisories/26283
http://secunia.com/advisories/26292
http://secunia.com/advisories/26293
http://secunia.com/advisories/26297
http://secunia.com/advisories/26307
http://secunia.com/advisories/26318
http://secunia.com/advisories/26325
http://secunia.com/advisories/26342
http://secunia.com/advisories/26343
http://secunia.com/advisories/26358
http://secunia.com/advisories/26365
http://secunia.com/advisories/26370
http://secunia.com/advisories/26395
http://secunia.com/advisories/26403
http://secunia.com/advisories/26405
http://secunia.com/advisories/26407
http://secunia.com/advisories/26410
http://secunia.com/advisories/26413
http://secunia.com/advisories/26425
http://secunia.com/advisories/26432
http://secunia.com/advisories/26436
http://secunia.com/advisories/26467
http://secunia.com/advisories/26468
http://secunia.com/advisories/26470
http://secunia.com/advisories/26514
http://secunia.com/advisories/26607
http://secunia.com/advisories/26627
http://secunia.com/advisories/26862
http://secunia.com/advisories/26982
http://secunia.com/advisories/27156
http://secunia.com/advisories/27281
http://secunia.com/advisories/27308
http://secunia.com/advisories/27637
http://secunia.com/advisories/30168
SGI Security Advisory: 20070801-01-P
ftp://patches.sgi.com/support/free/security/advisories/20070801-01-P.asc
http://www.slackware.org/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.423670
http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.761882
SuSE Security Announcement: SUSE-SR:2007:015 (Google Search)
http://www.novell.com/linux/security/advisories/2007_15_sr.html
SuSE Security Announcement: SUSE-SR:2007:016 (Google Search)
http://www.novell.com/linux/security/advisories/2007_16_sr.html
http://www.ubuntu.com/usn/usn-496-1
http://www.ubuntu.com/usn/usn-496-2
http://www.vupen.com/english/advisories/2007/2704
http://www.vupen.com/english/advisories/2007/2705
CopyrightCopyright (c) 2012 E-Soft Inc. http://www.securityspace.com

Dies ist nur einer von 85075 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2020 E-Soft Inc. Alle Rechte vorbehalten.