Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 146377 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.122550
Kategorie:Oracle Linux Local Security Checks
Titel:Oracle: Security Advisory (ELSA-2008-0937)
Zusammenfassung:The remote host is missing an update for the 'cups' package(s) announced via the ELSA-2008-0937 advisory.
Beschreibung:Summary:
The remote host is missing an update for the 'cups' package(s) announced via the ELSA-2008-0937 advisory.

Vulnerability Insight:
[1.2.4-11.18:.2]
- Applied patch to fix CVE-2008-3639 (STR #2918, bug #464721).
- Applied patch to fix CVE-2008-3640 (STR #2919, bug #464721).
- Applied patch to fix CVE-2008-3641 (STR #2911, bug #464721).

Affected Software/OS:
'cups' package(s) on Oracle Linux 3, Oracle Linux 4, Oracle Linux 5.

Solution:
Please install the updated package(s).

CVSS Score:
10.0

CVSS Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2008-3639
BugTraq ID: 31690
http://www.securityfocus.com/bid/31690
Debian Security Information: DSA-1656 (Google Search)
http://www.debian.org/security/2008/dsa-1656
https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00331.html
https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00380.html
http://www.gentoo.org/security/en/glsa/glsa-200812-11.xml
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=753
http://www.mandriva.com/security/advisories?name=MDVSA-2008:211
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11464
http://www.redhat.com/support/errata/RHSA-2008-0937.html
http://www.securitytracker.com/id?1021033
http://secunia.com/advisories/32084
http://secunia.com/advisories/32226
http://secunia.com/advisories/32284
http://secunia.com/advisories/32292
http://secunia.com/advisories/32316
http://secunia.com/advisories/32331
http://secunia.com/advisories/33085
http://secunia.com/advisories/33111
http://sunsolve.sun.com/search/document.do?assetkey=1-26-261088-1
SuSE Security Announcement: SUSE-SR:2008:021 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00006.html
https://usn.ubuntu.com/656-1/
http://www.vupen.com/english/advisories/2008/2782
http://www.vupen.com/english/advisories/2008/3401
http://www.vupen.com/english/advisories/2009/1568
XForce ISS Database: cups-readrle16-bo(45789)
https://exchange.xforce.ibmcloud.com/vulnerabilities/45789
Common Vulnerability Exposure (CVE) ID: CVE-2008-3640
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=752
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10266
http://www.securitytracker.com/id?1021034
XForce ISS Database: cups-writeprolog-bo(45790)
https://exchange.xforce.ibmcloud.com/vulnerabilities/45790
Common Vulnerability Exposure (CVE) ID: CVE-2008-3641
http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html
BugTraq ID: 31681
http://www.securityfocus.com/bid/31681
BugTraq ID: 31688
http://www.securityfocus.com/bid/31688
Bugtraq: 20081010 ZDI-08-067: Apple CUPS 1.3.7 (HP-GL/2 filter) Remote Code Execution Vulnerability (Google Search)
http://www.securityfocus.com/archive/1/497221/100/0/threaded
http://www.zerodayinitiative.com/advisories/ZDI-08-067
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9666
http://www.securitytracker.com/id?1021031
http://secunia.com/advisories/32222
http://secunia.com/advisories/33568
SuSE Security Announcement: SUSE-SR:2009:002 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-01/msg00004.html
http://www.vupen.com/english/advisories/2008/2780
XForce ISS Database: cups-hpgl-code-execution(45779)
https://exchange.xforce.ibmcloud.com/vulnerabilities/45779
CopyrightCopyright (C) 2015 Greenbone AG

Dies ist nur einer von 146377 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.