Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 146377 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.62186
Kategorie:CentOS Local Security Checks
Titel:CentOS Security Advisory CESA-2007:0513-01 (gimp)
Zusammenfassung:NOSUMMARY
Beschreibung:Description:

The remote host is missing updates to gimp announced in
advisory CESA-2007:0513-01.

For details on the issues addressed in this update,
please visit the referenced security advisories.

Solution:
Update the appropriate packages on your system.

https://secure1.securityspace.com/smysecure/catid.html?in=CESA-2007:0513-01
https://secure1.securityspace.com/smysecure/catid.html?in=RHSA-2007:0513
https://rhn.redhat.com/errata/rh21as-errata.html

Risk factor : High

CVSS Score:
6.8

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2006-4519
BugTraq ID: 24835
http://www.securityfocus.com/bid/24835
Bugtraq: 20070801 FLEA-2007-0038-1 gimp (Google Search)
http://www.securityfocus.com/archive/1/475257/100/0/threaded
Debian Security Information: DSA-1335 (Google Search)
http://www.debian.org/security/2007/dsa-1335
http://security.gentoo.org/glsa/glsa-200707-09.xml
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=551
http://www.mandriva.com/security/advisories?name=MDKSA-2007:170
http://osvdb.org/42139
http://osvdb.org/42140
http://osvdb.org/42141
http://osvdb.org/42142
http://osvdb.org/42143
http://osvdb.org/42144
http://osvdb.org/42145
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10842
http://www.redhat.com/support/errata/RHSA-2007-0513.html
http://www.securitytracker.com/id?1018349
http://secunia.com/advisories/26132
http://secunia.com/advisories/26215
http://secunia.com/advisories/26240
http://secunia.com/advisories/26575
http://secunia.com/advisories/26939
http://www.ubuntu.com/usn/usn-494-1
http://www.vupen.com/english/advisories/2007/2471
XForce ISS Database: gimp-plugins-code-execution(35308)
https://exchange.xforce.ibmcloud.com/vulnerabilities/35308
Common Vulnerability Exposure (CVE) ID: CVE-2007-2949
BugTraq ID: 24745
http://www.securityfocus.com/bid/24745
CERT/CC vulnerability note: VU#399896
http://www.kb.cert.org/vuls/id/399896
http://secunia.com/secunia_research/2007-63/advisory/
http://osvdb.org/37804
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11276
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5772
http://secunia.com/advisories/25677
http://secunia.com/advisories/25949
http://secunia.com/advisories/26044
http://secunia.com/advisories/26384
http://secunia.com/advisories/28114
http://www.slackware.org/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.360191
http://sunsolve.sun.com/search/document.do?assetkey=1-26-103170-1
http://sunsolve.sun.com/search/document.do?assetkey=1-66-201320-1
SuSE Security Announcement: SUSE-SR:2007:015 (Google Search)
http://www.novell.com/linux/security/advisories/2007_15_sr.html
http://www.ubuntu.com/usn/usn-480-1
http://www.vupen.com/english/advisories/2007/2421
http://www.vupen.com/english/advisories/2007/4241
XForce ISS Database: gimp-unpackpixeldata-code-execution(35246)
https://exchange.xforce.ibmcloud.com/vulnerabilities/35246
Common Vulnerability Exposure (CVE) ID: CVE-2007-3741
25424
http://www.securityfocus.com/bid/25424
26575
26939
42128
http://osvdb.org/42128
42129
http://osvdb.org/42129
42130
http://osvdb.org/42130
42131
http://osvdb.org/42131
MDKSA-2007:170
RHSA-2007:0513
oval:org.mitre.oval:def:10099
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10099
CopyrightCopyright (c) 2008 E-Soft Inc. http://www.securityspace.com

Dies ist nur einer von 146377 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.