Anfälligkeitssuche        Suche in 219043 CVE Beschreibungen
und 99761 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.881874
Kategorie:CentOS Local Security Checks
Titel:CentOS Update for librsvg2 CESA-2014:0127 centos6
Zusammenfassung:The remote host is missing an update for the 'librsvg2'; package(s) announced via the referenced advisory.
Beschreibung:Summary:
The remote host is missing an update for the 'librsvg2'
package(s) announced via the referenced advisory.

Vulnerability Insight:
The librsvg2 packages provide an SVG (Scalable Vector Graphics) library
based on libart.

An XML External Entity expansion flaw was found in the way librsvg2
processed SVG files. If a user were to open a malicious SVG file, a remote
attacker could possibly obtain a copy of the local resources that the user
had access to. (CVE-2013-1881)

All librsvg2 users are advised to upgrade to these updated packages, which
contain a backported patch to correct this issue. All running applications
that use librsvg2 must be restarted for this update to take effect.

Affected Software/OS:
librsvg2 on CentOS 6

Solution:
Please install the updated packages.

CVSS Score:
4.3

CVSS Vector:
AV:N/AC:M/Au:N/C:P/I:N/A:N

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2013-1881
http://en.securitylab.ru/lab/PT-2013-01
RedHat Security Advisories: RHSA-2014:0127
http://rhn.redhat.com/errata/RHSA-2014-0127.html
http://secunia.com/advisories/55088
SuSE Security Announcement: SUSE-SU-2015:1785 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00020.html
SuSE Security Announcement: openSUSE-SU-2013:1786 (Google Search)
http://lists.opensuse.org/opensuse-updates/2013-11/msg00114.html
http://www.ubuntu.com/usn/USN-2149-1
http://www.ubuntu.com/usn/USN-2149-2
CopyrightCopyright (C) 2014 Greenbone Networks GmbH

Dies ist nur einer von 99761 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2024 E-Soft Inc. Alle Rechte vorbehalten.