Anfälligkeitssuche        Suche in 219043 CVE Beschreibungen
und 99761 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.54426
Kategorie:Mandrake Local Security Checks
Titel:Mandrake Security Advisory MDKSA-2005:124 (zlib)
Zusammenfassung:NOSUMMARY
Beschreibung:Description:

The remote host is missing an update to zlib
announced via advisory MDKSA-2005:124.

A previous zlib update (MDKSA-2005:112
CVE-2005-2096) fixed an overflow
flaw in the zlib program. While that update did indeed fix the reported
overflow issue, Markus Oberhumber discovered additional ways that a
specially-crafted compressed stream could trigger an overflow. An
attacker could create such a stream that would cause a linked
application to crash if opened by a user.

The updated packages are provided to protect against this flaw. The
Corporate Server 2.1 product is not affected by this vulnerability.

Affected versions: 10.0, 10.1, 10.2, Corporate 3.0,
Multi Network Firewall 2.0

Solution:
To upgrade automatically use MandrakeUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

https://secure1.securityspace.com/smysecure/catid.html?in=MDKSA-2005:124

Risk factor : High

CVSS Score:
7.5

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2005-2096
http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html
http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html
http://lists.apple.com/archives/security-announce//2008/Nov/msg00001.html
BugTraq ID: 14162
http://www.securityfocus.com/bid/14162
Bugtraq: 20070404 VMSA-2007-0003 VMware ESX 3.0.1 and 3.0.0 server security updates (Google Search)
http://www.securityfocus.com/archive/1/464745/100/0/threaded
Bugtraq: 20071018 Official Windows binaries of "curl" contain vulnerable zlib 1.2.2 (CAN-2005-2096) (Google Search)
http://www.securityfocus.com/archive/1/482505/100/0/threaded
Bugtraq: 20071018 Windows binary of "GSview 4.8" contain vulnerable zlib (CAN-2005-2096) (Google Search)
http://www.securityfocus.com/archive/1/482503/100/0/threaded
Bugtraq: 20071029 Re: Windows binary of "GSview 4.8" contain vulnerable zlib (CAN-2005-2096) (Google Search)
http://www.securityfocus.com/archive/1/482571/100/0/threaded
http://www.securityfocus.com/archive/1/482601/100/0/threaded
http://www.securityfocus.com/archive/1/482949/100/0/threaded
Bugtraq: 20071029 Windows binary of "Virtual Floppy Drive 2.1" contains vulnerable zlib (CAN-2005-2096) (Google Search)
http://www.securityfocus.com/archive/1/482950/100/0/threaded
CERT/CC vulnerability note: VU#680620
http://www.kb.cert.org/vuls/id/680620
Debian Security Information: DSA-1026 (Google Search)
http://www.debian.org/security/2006/dsa-1026
Debian Security Information: DSA-740 (Google Search)
http://www.debian.org/security/2005/dsa-740
Debian Security Information: DSA-797 (Google Search)
http://www.debian.org/security/2005/dsa-797
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=162680
FreeBSD Security Advisory: FreeBSD-SA-05:16.zlib
ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-05:16.zlib.asc
http://security.gentoo.org/glsa/glsa-200507-05.xml
http://www.gentoo.org/security/en/glsa/glsa-200509-18.xml
HPdes Security Advisory: HPSBUX02090
http://www.securityfocus.com/archive/1/421411/100/0/threaded
HPdes Security Advisory: SSRT051058
http://www.mandriva.com/security/advisories?name=MDKSA-2005:112
http://www.mandriva.com/security/advisories?name=MDKSA-2005:196
http://www.mandriva.com/security/advisories?name=MDKSA-2006:070
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=162391
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11500
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1262
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1542
http://www.redhat.com/support/errata/RHSA-2005-569.html
http://www.redhat.com/support/errata/RHSA-2008-0629.html
SCO Security Bulletin: SCOSA-2006.6
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.6/SCOSA-2006.6.txt
http://securitytracker.com/id?1014398
http://secunia.com/advisories/15949
http://secunia.com/advisories/17054
http://secunia.com/advisories/17225
http://secunia.com/advisories/17236
http://secunia.com/advisories/17326
http://secunia.com/advisories/17516
http://secunia.com/advisories/18377
http://secunia.com/advisories/18406
http://secunia.com/advisories/18507
http://secunia.com/advisories/19550
http://secunia.com/advisories/19597
http://secunia.com/advisories/24788
http://secunia.com/advisories/31492
http://secunia.com/advisories/32706
http://sunsolve.sun.com/search/document.do?assetkey=1-26-101989-1
SuSE Security Announcement: SUSE-SA:2005:039 (Google Search)
https://usn.ubuntu.com/148-1/
http://www.ubuntulinux.org/usn/usn-151-3
http://www.vupen.com/english/advisories/2005/0978
http://www.vupen.com/english/advisories/2006/0144
http://www.vupen.com/english/advisories/2007/1267
XForce ISS Database: hpux-secure-shell-dos(24064)
https://exchange.xforce.ibmcloud.com/vulnerabilities/24064
Common Vulnerability Exposure (CVE) ID: CVE-2005-1849
BugTraq ID: 14340
http://www.securityfocus.com/bid/14340
Debian Security Information: DSA-763 (Google Search)
http://www.debian.org/security/2005/dsa-763
http://www.gentoo.org/security/en/glsa/glsa-200603-18.xml
http://security.debian.org/pool/updates/main/z/zlib/zlib_1.2.2-4.sarge.2.diff.gz
http://www.osvdb.org/18141
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11402
http://www.redhat.com/support/errata/RHSA-2005-584.html
http://securitytracker.com/id?1014540
http://secunia.com/advisories/16137
http://secunia.com/advisories/19334
SuSE Security Announcement: SUSE-SA:2005:043 (Google Search)
http://www.novell.com/linux/security/advisories/2005_43_zlib.html
XForce ISS Database: zlib-codetable-dos(21456)
https://exchange.xforce.ibmcloud.com/vulnerabilities/21456
CopyrightCopyright (c) 2005 E-Soft Inc. http://www.securityspace.com

Dies ist nur einer von 99761 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2024 E-Soft Inc. Alle Rechte vorbehalten.