![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.51439 |
Categoría: | Conectiva Local Security Checks |
Título: | Conectiva Security Advisory CLA-2003:696 |
Resumen: | NOSUMMARY |
Descripción: | Description: The remote host is missing updates announced in advisory CLA-2003:696. ucd-snmp is an implementation and a set of tools to deal with the Simple Network Management Protocol (SNMP), which is used for remote administration and monitoring of network devices and services. Axioma Security Research found[1] a remote heap overflow vulnerability[2] in snmpnetstat (a tool used to retrieve information about a remote host). When a list of interfaces is requested, a malicious server can return information in a way that will cause a heap overflow in snmpnetstat. A remote atacker able to control a snmp server can exploit this vulnerability to execute arbitrary code with the privileges of the user running snmpnetstat. Solution: The apt tool can be used to perform RPM package upgrades by running 'apt-get update' followed by 'apt-get upgrade' http://www.securityfocus.com/archive/1/248141 http://www.securityfocus.com/bid/3780 https://secure1.securityspace.com/smysecure/catid.html?in=CLA-2003:696 http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=002003 Risk factor : High |
Copyright | Copyright (c) 2005 E-Soft Inc. http://www.securityspace.com |
Esta es sólo una de 146377 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |