Anfälligkeitssuche        Suche in 219043 CVE Beschreibungen
und 99761 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.851432
Kategorie:SuSE Local Security Checks
Titel:openSUSE: Security Advisory for curl (openSUSE-SU-2016:2768-1)
Zusammenfassung:The remote host is missing an update for the 'curl'; package(s) announced via the referenced advisory.
Beschreibung:Summary:
The remote host is missing an update for the 'curl'
package(s) announced via the referenced advisory.

Vulnerability Insight:
This update for curl fixes the following security issues:

- CVE-2016-8624: invalid URL parsing with '#' (bsc#1005646)

- CVE-2016-8623: Use-after-free via shared cookies (bsc#1005645)

- CVE-2016-8622: URL unescape heap overflow via integer truncation
(bsc#1005643)

- CVE-2016-8621: curl_getdate read out of bounds (bsc#1005642)

- CVE-2016-8620: glob parser write/read out of bounds (bsc#1005640)

- CVE-2016-8619: double-free in krb5 code (bsc#1005638)

- CVE-2016-8618: double-free in curl_maprintf (bsc#1005637)

- CVE-2016-8617: OOB write via unchecked multiplication (bsc#1005635)

- CVE-2016-8616: case insensitive password comparison (bsc#1005634)

- CVE-2016-8615: cookie injection for other servers (bsc#1005633)

- CVE-2016-7167: escape and unescape integer overflows (bsc#998760)

This update was imported from the SUSE:SLE-12:Update update project.

Affected Software/OS:
curl on openSUSE Leap 42.1

Solution:
Please install the updated package(s).

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2016-7167
BugTraq ID: 92975
http://www.securityfocus.com/bid/92975
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B3IU2FRXQNU6UJIQT4NGLWWTP2GJQXO7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LTH54DFOS4TSYPG5XKJDGAG4XPAR4T7M/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZMRWVISG7VUCYRMF23A2UHMYD72VQWAK/
https://security.gentoo.org/glsa/201701-47
https://lists.debian.org/debian-lts-announce/2018/11/msg00005.html
RedHat Security Advisories: RHSA-2017:2016
https://access.redhat.com/errata/RHSA-2017:2016
RedHat Security Advisories: RHSA-2018:2486
https://access.redhat.com/errata/RHSA-2018:2486
RedHat Security Advisories: RHSA-2018:3558
https://access.redhat.com/errata/RHSA-2018:3558
http://www.securitytracker.com/id/1036813
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.538632
Common Vulnerability Exposure (CVE) ID: CVE-2016-8615
BugTraq ID: 94096
http://www.securityfocus.com/bid/94096
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
http://www.securitytracker.com/id/1037192
Common Vulnerability Exposure (CVE) ID: CVE-2016-8616
BugTraq ID: 94094
http://www.securityfocus.com/bid/94094
Common Vulnerability Exposure (CVE) ID: CVE-2016-8617
BugTraq ID: 94097
http://www.securityfocus.com/bid/94097
Common Vulnerability Exposure (CVE) ID: CVE-2016-8618
BugTraq ID: 94098
http://www.securityfocus.com/bid/94098
Common Vulnerability Exposure (CVE) ID: CVE-2016-8619
BugTraq ID: 94100
http://www.securityfocus.com/bid/94100
Common Vulnerability Exposure (CVE) ID: CVE-2016-8620
BugTraq ID: 94102
http://www.securityfocus.com/bid/94102
Common Vulnerability Exposure (CVE) ID: CVE-2016-8621
BugTraq ID: 94101
http://www.securityfocus.com/bid/94101
Common Vulnerability Exposure (CVE) ID: CVE-2016-8622
BugTraq ID: 94105
http://www.securityfocus.com/bid/94105
Common Vulnerability Exposure (CVE) ID: CVE-2016-8623
BugTraq ID: 94106
http://www.securityfocus.com/bid/94106
Common Vulnerability Exposure (CVE) ID: CVE-2016-8624
BugTraq ID: 94103
http://www.securityfocus.com/bid/94103
https://curl.haxx.se/docs/adv_20161102J.html
https://lists.apache.org/thread.html/rfaa4d578587f52a9c4d176af516a681a712c664e3be440a4163691d5@%3Ccommits.pulsar.apache.org%3E
CopyrightCopyright (C) 2016 Greenbone Networks GmbH

Dies ist nur einer von 99761 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2024 E-Soft Inc. Alle Rechte vorbehalten.