Anfälligkeitssuche        Suche in 187964 CVE Beschreibungen
und 85075 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.64439
Kategorie:Slackware Local Security Checks
Titel:Slackware Advisory SSA:2009-195-01 dhcp
Zusammenfassung:The remote host is missing an update as announced;via advisory SSA:2009-195-01.
Beschreibung:Summary:
The remote host is missing an update as announced
via advisory SSA:2009-195-01.

Vulnerability Insight:
New dhcp packages are available for Slackware 8.1, 9.0, 9.1, 10.0, 10.1, 10.2,
11.0, 12.0, 12.1, 12.2, and -current to fix a security issue with dhclient.

Note that dhclient is not the default DHCP client in Slackware's networking
scripts, dhcpcd is. However, if you use dhclient on a network where someone
could deploy a hostile DHCP server, you should upgrade to the new package.

Solution:
Upgrade to the new package(s).

CVSS Score:
10.0

CVSS Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2009-0692
BugTraq ID: 35668
http://www.securityfocus.com/bid/35668
CERT/CC vulnerability note: VU#410676
http://www.kb.cert.org/vuls/id/410676
Debian Security Information: DSA-1833 (Google Search)
http://www.debian.org/security/2009/dsa-1833
https://www.redhat.com/archives/fedora-package-announce/2009-August/msg01177.html
https://www.redhat.com/archives/fedora-package-announce/2009-November/msg00340.html
http://security.gentoo.org/glsa/glsa-200907-12.xml
HPdes Security Advisory: HPSBMA02554
http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02286083
HPdes Security Advisory: SSRT100018
http://www.mandriva.com/security/advisories?name=MDVSA-2009:151
NETBSD Security Advisory: NetBSD-SA2009-010
http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2009-010.txt.asc
http://www.osvdb.org/55819
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10758
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5941
http://www.redhat.com/support/errata/RHSA-2009-1136.html
http://www.redhat.com/support/errata/RHSA-2009-1154.html
http://www.securitytracker.com/id?1022548
http://secunia.com/advisories/35785
http://secunia.com/advisories/35829
http://secunia.com/advisories/35830
http://secunia.com/advisories/35831
http://secunia.com/advisories/35832
http://secunia.com/advisories/35841
http://secunia.com/advisories/35849
http://secunia.com/advisories/35850
http://secunia.com/advisories/35851
http://secunia.com/advisories/35880
http://secunia.com/advisories/36457
http://secunia.com/advisories/37342
http://secunia.com/advisories/40551
http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.561471
SuSE Security Announcement: SUSE-SA:2009:037 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00003.html
http://www.ubuntu.com/usn/usn-803-1
http://www.vupen.com/english/advisories/2009/1891
http://www.vupen.com/english/advisories/2010/1796
CopyrightCopyright (c) 2012 E-Soft Inc. http://www.securityspace.com

Dies ist nur einer von 85075 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2020 E-Soft Inc. Alle Rechte vorbehalten.