Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 146377 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.68536
Kategorie:CentOS Local Security Checks
Titel:CentOS Security Advisory CESA-2010:0785 (quagga)
Zusammenfassung:NOSUMMARY
Beschreibung:Description:
The remote host is missing updates to quagga announced in
advisory CESA-2010:0785.

For details on the issues addressed in this update,
please visit the referenced security advisories.

Solution:
Update the appropriate packages on your system.

https://secure1.securityspace.com/smysecure/catid.html?in=CESA-2010:0785
https://secure1.securityspace.com/smysecure/catid.html?in=RHSA-2010:0785
https://rhn.redhat.com/errata/RHSA-2010-0785.html

Risk factor : High

CVSS Score:
6.5

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2007-4826
2007-0028
http://www.trustix.org/errata/2007/0028/
236141
http://sunsolve.sun.com/search/document.do?assetkey=1-26-236141-1
25634
http://www.securityfocus.com/bid/25634
26744
http://secunia.com/advisories/26744
26829
http://secunia.com/advisories/26829
26863
http://secunia.com/advisories/26863
27049
http://secunia.com/advisories/27049
29743
http://secunia.com/advisories/29743
ADV-2007-3129
http://www.vupen.com/english/advisories/2007/3129
ADV-2008-1195
http://www.vupen.com/english/advisories/2008/1195/references
DSA-1382
http://www.debian.org/security/2007/dsa-1382
FEDORA-2007-2196
http://fedoranews.org/updates/FEDORA-2007-219.shtml
MDKSA-2007:182
http://www.mandriva.com/security/advisories?name=MDKSA-2007:182
RHSA-2010:0785
http://www.redhat.com/support/errata/RHSA-2010-0785.html
USN-512-1
http://www.ubuntu.com/usn/usn-512-1
[debian-security-announce] 20071003 [SECURITY] [DSA 1379-1] New quagga packages fix denial of service
http://lists.debian.org/debian-security-announce/debian-security-announce-2007/msg00153.html
http://quagga.net/news2.php?y=2007&m=9&d=7#id1189190760
http://www.quagga.net/download/quagga-0.99.9.changelog.txt
quagga-bgpd-dos(36551)
https://exchange.xforce.ibmcloud.com/vulnerabilities/36551
Common Vulnerability Exposure (CVE) ID: CVE-2010-2948
41038
http://secunia.com/advisories/41038
41238
http://secunia.com/advisories/41238
42397
http://secunia.com/advisories/42397
42446
http://secunia.com/advisories/42446
42498
http://secunia.com/advisories/42498
42635
http://www.securityfocus.com/bid/42635
48106
http://secunia.com/advisories/48106
ADV-2010-2304
http://www.vupen.com/english/advisories/2010/2304
ADV-2010-3097
http://www.vupen.com/english/advisories/2010/3097
ADV-2010-3124
http://www.vupen.com/english/advisories/2010/3124
DSA-2104
http://www.debian.org/security/2010/dsa-2104
GLSA-201202-02
http://security.gentoo.org/glsa/glsa-201202-02.xml
MDVSA-2010:174
http://www.mandriva.com/security/advisories?name=MDVSA-2010:174
RHSA-2010:0945
http://www.redhat.com/support/errata/RHSA-2010-0945.html
SUSE-SR:2010:022
http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00006.html
SUSE-SU-2011:1316
http://lists.opensuse.org/opensuse-security-announce/2011-12/msg00009.html
USN-1027-1
http://www.ubuntu.com/usn/USN-1027-1
[oss-security] 20100824 CVE Request -- Quagga (bgpd) [two ids] -- 1, Stack buffer overflow by processing crafted Refresh-Route msgs 2, NULL ptr deref by parsing certain AS paths by BGP update request
http://www.openwall.com/lists/oss-security/2010/08/24/3
[oss-security] 20100825 Re: CVE Request -- Quagga (bgpd) [two ids] -- 1, Stack buffer overflow by processing crafted Refresh-Route msgs 2, NULL ptr deref by parsing certain AS paths by BGP update request
http://www.openwall.com/lists/oss-security/2010/08/25/4
http://code.quagga.net/?p=quagga.git%3Ba=commit%3Bh=d64379e8f3c0636df53ed08d5b2f1946cfedd0e3
http://www.quagga.net/news2.php?y=2010&m=8&d=19
https://bugzilla.redhat.com/show_bug.cgi?id=626783
CopyrightCopyright (c) 2010 E-Soft Inc. http://www.securityspace.com

Dies ist nur einer von 146377 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.