Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 146377 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.61981
Kategorie:CentOS Local Security Checks
Titel:CentOS Security Advisory CESA-2008:0937 (cups)
Zusammenfassung:NOSUMMARY
Beschreibung:Description:

The remote host is missing updates to cups announced in
advisory CESA-2008:0937.

For details on the issues addressed in this update,
please visit the referenced security advisories.

Solution:
Update the appropriate packages on your system.

https://secure1.securityspace.com/smysecure/catid.html?in=CESA-2008:0937
https://secure1.securityspace.com/smysecure/catid.html?in=RHSA-2008:0937
https://rhn.redhat.com/errata/RHSA-2008-0937.html

Risk factor : Critical

CVSS Score:
10.0

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2008-3639
BugTraq ID: 31690
http://www.securityfocus.com/bid/31690
Debian Security Information: DSA-1656 (Google Search)
http://www.debian.org/security/2008/dsa-1656
https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00331.html
https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00380.html
http://www.gentoo.org/security/en/glsa/glsa-200812-11.xml
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=753
http://www.mandriva.com/security/advisories?name=MDVSA-2008:211
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11464
http://www.redhat.com/support/errata/RHSA-2008-0937.html
http://www.securitytracker.com/id?1021033
http://secunia.com/advisories/32084
http://secunia.com/advisories/32226
http://secunia.com/advisories/32284
http://secunia.com/advisories/32292
http://secunia.com/advisories/32316
http://secunia.com/advisories/32331
http://secunia.com/advisories/33085
http://secunia.com/advisories/33111
http://sunsolve.sun.com/search/document.do?assetkey=1-26-261088-1
SuSE Security Announcement: SUSE-SR:2008:021 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00006.html
https://usn.ubuntu.com/656-1/
http://www.vupen.com/english/advisories/2008/2782
http://www.vupen.com/english/advisories/2008/3401
http://www.vupen.com/english/advisories/2009/1568
XForce ISS Database: cups-readrle16-bo(45789)
https://exchange.xforce.ibmcloud.com/vulnerabilities/45789
Common Vulnerability Exposure (CVE) ID: CVE-2008-3640
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=752
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10266
http://www.securitytracker.com/id?1021034
XForce ISS Database: cups-writeprolog-bo(45790)
https://exchange.xforce.ibmcloud.com/vulnerabilities/45790
Common Vulnerability Exposure (CVE) ID: CVE-2008-3641
http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html
BugTraq ID: 31681
http://www.securityfocus.com/bid/31681
BugTraq ID: 31688
http://www.securityfocus.com/bid/31688
Bugtraq: 20081010 ZDI-08-067: Apple CUPS 1.3.7 (HP-GL/2 filter) Remote Code Execution Vulnerability (Google Search)
http://www.securityfocus.com/archive/1/497221/100/0/threaded
http://www.zerodayinitiative.com/advisories/ZDI-08-067
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9666
http://www.securitytracker.com/id?1021031
http://secunia.com/advisories/32222
http://secunia.com/advisories/33568
SuSE Security Announcement: SUSE-SR:2009:002 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-01/msg00004.html
http://www.vupen.com/english/advisories/2008/2780
XForce ISS Database: cups-hpgl-code-execution(45779)
https://exchange.xforce.ibmcloud.com/vulnerabilities/45779
CopyrightCopyright (c) 2008 E-Soft Inc. http://www.securityspace.com

Dies ist nur einer von 146377 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.