Anfälligkeitssuche        Suche in 219043 CVE Beschreibungen
und 99761 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.59602
Kategorie:Fedora Local Security Checks
Titel:Fedora Core 6 FEDORA-2007-703 (qt)
Zusammenfassung:NOSUMMARY
Beschreibung:Description:

The remote host is missing an update to qt
announced via advisory FEDORA-2007-703.

Qt is a GUI software toolkit which simplifies the task of writing and
maintaining GUI (Graphical User Interface) applications
for the X Window System.

Qt is written in C++ and is fully object-oriented.

This package contains the shared library needed to run qt
applications, as well as the README files for qt.


* Mon Sep 17 2007 Than Ngo - 1:3.3.8-2.fc6
- bz292951, CVE-2007-4137
* Wed Aug 29 2007 Than Ngo - 1:3.3.8-1.fc6.1
- CVE-2007-3388 qt format string flaw
- bz#234635, CVE-2007-0242 qt UTF8 improper character expansion

Solution: Apply the appropriate updates.

This update can be downloaded from:
http://download.fedora.redhat.com/pub/fedora/linux/core/updates/6/


This update can be installed with the 'yum' update program. Use 'yum update
package-name' at the command line. For more information, refer to 'Managing
Software with yum,' available at http://fedora.redhat.com/docs/yum/.


http://www.securityspace.com/smysecure/catid.html?in=FEDORA-2007-703

Risk factor : High

CVSS Score:
7.5

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2007-4137
BugTraq ID: 25657
http://www.securityfocus.com/bid/25657
Bugtraq: 20071004 FLEA-2007-0059-1 qt qt-tools (Google Search)
http://www.securityfocus.com/archive/1/481498/100/0/threaded
Debian Security Information: DSA-1426 (Google Search)
http://www.debian.org/security/2007/dsa-1426
http://fedoranews.org/updates/FEDORA-2007-221.shtml
http://fedoranews.org/updates/FEDORA-2007-703.shtml
http://security.gentoo.org/glsa/glsa-200710-28.xml
http://security.gentoo.org/glsa/glsa-200712-08.xml
http://www.mandriva.com/security/advisories?name=MDKSA-2007:183
http://dist.trolltech.com/developer/download/175791_3.diff
http://dist.trolltech.com/developer/download/175791_4.diff
https://bugzilla.redhat.com/show_bug.cgi?id=269001
http://osvdb.org/39384
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11159
http://www.redhat.com/support/errata/RHSA-2007-0883.html
http://securitytracker.com/id?1018688
http://secunia.com/advisories/26778
http://secunia.com/advisories/26782
http://secunia.com/advisories/26804
http://secunia.com/advisories/26811
http://secunia.com/advisories/26857
http://secunia.com/advisories/26868
http://secunia.com/advisories/26882
http://secunia.com/advisories/26987
http://secunia.com/advisories/27053
http://secunia.com/advisories/27275
http://secunia.com/advisories/27382
http://secunia.com/advisories/27996
http://secunia.com/advisories/28021
SGI Security Advisory: 20070901-01-P
ftp://patches.sgi.com/support/free/security/advisories/20070901-01-P.asc
SuSE Security Announcement: SUSE-SR:2007:019 (Google Search)
http://www.novell.com/linux/security/advisories/2007_19_sr.html
http://www.ubuntu.com/usn/usn-513-1
http://www.vupen.com/english/advisories/2007/3144
Common Vulnerability Exposure (CVE) ID: CVE-2007-3388
BugTraq ID: 25154
http://www.securityfocus.com/bid/25154
Bugtraq: 20070803 FLEA-2007-0042-1 qt (Google Search)
http://www.securityfocus.com/archive/1/475480/30/5550/threaded
http://www.gentoo.org/security/en/glsa/glsa-200708-16.xml
http://www.gentoo.org/security/en/glsa/glsa-200710-28.xml
http://www.mandriva.com/security/advisories?name=MDKSA-2007:151
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9690
http://www.redhat.com/support/errata/RHSA-2007-0721.html
http://securitytracker.com/id?1018485
http://secunia.com/advisories/24460
http://secunia.com/advisories/26264
http://secunia.com/advisories/26284
http://secunia.com/advisories/26291
http://secunia.com/advisories/26295
http://secunia.com/advisories/26298
http://secunia.com/advisories/26306
http://secunia.com/advisories/26385
http://secunia.com/advisories/26607
http://secunia.com/advisories/26852
SGI Security Advisory: 20070801-01-P
ftp://patches.sgi.com/support/free/security/advisories/20070801-01-P.asc
http://www.slackware.org/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.354168
SuSE Security Announcement: SUSE-SA:2007:048 (Google Search)
http://www.novell.com/linux/security/advisories/2007_48_qt3.html
http://www.ubuntu.com/usn/usn-495-1
http://www.vupen.com/english/advisories/2007/2733
Common Vulnerability Exposure (CVE) ID: CVE-2007-0242
BugTraq ID: 23269
http://www.securityfocus.com/bid/23269
Debian Security Information: DSA-1292 (Google Search)
http://www.debian.org/security/2007/dsa-1292
http://www.mandriva.com/security/advisories?name=MDKSA-2007:074
http://www.mandriva.com/security/advisories?name=MDKSA-2007:075
http://www.mandriva.com/security/advisories?name=MDKSA-2007:076
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11510
http://www.redhat.com/support/errata/RHSA-2007-0909.html
RedHat Security Advisories: RHSA-2011:1324
http://rhn.redhat.com/errata/RHSA-2011-1324.html
http://secunia.com/advisories/24699
http://secunia.com/advisories/24705
http://secunia.com/advisories/24726
http://secunia.com/advisories/24727
http://secunia.com/advisories/24759
http://secunia.com/advisories/24797
http://secunia.com/advisories/24847
http://secunia.com/advisories/24889
http://secunia.com/advisories/25263
http://secunia.com/advisories/27108
http://secunia.com/advisories/46117
http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.348591
SuSE Security Announcement: SUSE-SR:2007:006 (Google Search)
http://www.novell.com/linux/security/advisories/2007_6_sr.html
http://www.ubuntu.com/usn/usn-452-1
http://www.vupen.com/english/advisories/2007/1212
XForce ISS Database: qt-utf8-xss(33397)
https://exchange.xforce.ibmcloud.com/vulnerabilities/33397
CopyrightCopyright (c) 2007 E-Soft Inc. http://www.securityspace.com

Dies ist nur einer von 99761 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2024 E-Soft Inc. Alle Rechte vorbehalten.