Anfälligkeitssuche        Suche in 219043 CVE Beschreibungen
und 99761 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.67083
Kategorie:Mandrake Local Security Checks
Titel:Mandriva Security Advisory MDVSA-2010:062 (curl)
Zusammenfassung:NOSUMMARY
Beschreibung:Description:
The remote host is missing an update to curl
announced via advisory MDVSA-2010:062.

A vulnerability has been found and corrected in curl:

content_encoding.c in libcurl 7.10.5 through 7.19.7, when zlib is
enabled, does not properly restrict the amount of callback data sent
to an application that requests automatic decompression, which might
allow remote attackers to cause a denial of service (application
crash) or have unspecified other impact by sending crafted compressed
data to an application that relies on the intended data-length limit
(CVE-2010-0734).

Packages for 2008.0 are provided for Corporate Desktop 2008.0
customers.

The updated packages have been patched to correct theis issue.

Affected: 2008.0, 2009.0, 2009.1, 2010.0, Corporate 4.0,
Enterprise Server 5.0, Multi Network Firewall 2.0


Solution:
To upgrade automatically use MandrakeUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

http://www.securityspace.com/smysecure/catid.html?in=MDVSA-2010:062

Risk factor : High

CVSS Score:
6.8

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2010-0734
http://lists.apple.com/archives/security-announce/2010//Jun/msg00001.html
Bugtraq: 20101027 rPSA-2010-0072-1 curl (Google Search)
http://www.securityfocus.com/archive/1/514490/100/0/threaded
Bugtraq: 20110211 VMSA-2011-0003 Third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX (Google Search)
http://www.securityfocus.com/archive/1/516397/100/0/threaded
Debian Security Information: DSA-2023 (Google Search)
http://www.debian.org/security/2010/dsa-2023
http://lists.fedoraproject.org/pipermail/package-announce/2010-March/037143.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-March/036744.html
http://security.gentoo.org/glsa/glsa-201203-02.xml
http://www.mandriva.com/security/advisories?name=MDVSA-2010:062
http://www.openwall.com/lists/oss-security/2010/02/09/5
http://www.openwall.com/lists/oss-security/2010/03/09/1
http://www.openwall.com/lists/oss-security/2010/03/16/11
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10760
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6756
http://www.redhat.com/support/errata/RHSA-2010-0329.html
http://secunia.com/advisories/38843
http://secunia.com/advisories/38981
http://secunia.com/advisories/39087
http://secunia.com/advisories/39734
http://secunia.com/advisories/40220
http://secunia.com/advisories/45047
http://secunia.com/advisories/48256
http://www.ubuntu.com/usn/USN-1158-1
http://www.vupen.com/english/advisories/2010/0571
http://www.vupen.com/english/advisories/2010/0602
http://www.vupen.com/english/advisories/2010/0660
http://www.vupen.com/english/advisories/2010/0725
http://www.vupen.com/english/advisories/2010/1481
CopyrightCopyright (c) 2010 E-Soft Inc. http://www.securityspace.com

Dies ist nur einer von 99761 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2024 E-Soft Inc. Alle Rechte vorbehalten.