![]() |
Startseite ▼ Bookkeeping
Online ▼ Sicherheits
Überprüfungs ▼
Verwaltetes
DNS ▼
Info
Bestellen/Erneuern
FAQ
AUP
Dynamic DNS Clients
Domaine konfigurieren Dyanmic DNS Update Password Netzwerk
Überwachung ▼
Enterprise
Erweiterte
Standard
Gratis Test
FAQ
Preis/Funktionszusammenfassung
Bestellen
Beispiele
Konfigurieren/Status Alarm Profile | ||
Test Kennung: | 1.3.6.1.4.1.25623.1.0.881087 |
Kategorie: | CentOS Local Security Checks |
Titel: | CentOS Update for libxml2 CESA-2012:0324 centos6 |
Zusammenfassung: | The remote host is missing an update for the 'libxml2'; package(s) announced via the referenced advisory. |
Beschreibung: | Summary: The remote host is missing an update for the 'libxml2' package(s) announced via the referenced advisory. Vulnerability Insight: The libxml2 library is a development toolbox providing the implementation of various XML standards. It was found that the hashing routine used by libxml2 arrays was susceptible to predictable hash collisions. Sending a specially-crafted message to an XML service could result in longer processing time, which could lead to a denial of service. To mitigate this issue, randomization has been added to the hashing function to reduce the chance of an attacker successfully causing intentional collisions. (CVE-2012-0841) All users of libxml2 are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. The desktop must be restarted (log out, then log back in) for this update to take effect. Affected Software/OS: libxml2 on CentOS 6 Solution: Please install the updated packages. CVSS Score: 5.0 CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P |
Querverweis: |
Common Vulnerability Exposure (CVE) ID: CVE-2012-0841 1026723 http://securitytracker.com/id?1026723 52107 http://www.securityfocus.com/bid/52107 54886 http://secunia.com/advisories/54886 55568 http://secunia.com/advisories/55568 APPLE-SA-2013-09-18-2 http://lists.apple.com/archives/security-announce/2013/Sep/msg00006.html APPLE-SA-2013-10-22-8 http://lists.apple.com/archives/security-announce/2013/Oct/msg00009.html DSA-2417 http://www.debian.org/security/2012/dsa-2417 MDVSA-2013:150 http://www.mandriva.com/security/advisories?name=MDVSA-2013:150 RHSA-2012:0324 http://rhn.redhat.com/errata/RHSA-2012-0324.html RHSA-2013:0217 http://rhn.redhat.com/errata/RHSA-2013-0217.html SUSE-SU-2013:1627 http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00002.html [oss-security] 20120222 libxml2: hash table collisions CPU usage DoS http://www.openwall.com/lists/oss-security/2012/02/22/1 http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=660846 http://git.gnome.org/browse/libxml2/commit/?id=8973d58b7498fa5100a876815476b81fd1a2412a http://support.apple.com/kb/HT5934 http://support.apple.com/kb/HT6001 http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html http://www.xerox.com/download/security/security-bulletin/16287-4d6b7b0c81f7b/cert_XRX13-003_v1.0.pdf http://xmlsoft.org/news.html https://blogs.oracle.com/sunsecurity/entry/cve_2012_0841_denial_of |
Copyright | Copyright (C) 2012 Greenbone AG |
Dies ist nur einer von 146377 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus. Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten. |