Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
146377 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.55721
Categoría:Mandrake Local Security Checks
Título:Mandrake Security Advisory MDKSA-2005:187 (dia)
Resumen:NOSUMMARY
Descripción:Description:

The remote host is missing an update to dia
announced via advisory MDKSA-2005:187.

Joxean Koret discovered that the Python SVG import plugin in dia,
a vector-oriented diagram editor, does not properly sanitise data
read from an SVG file and is hence vulnerable to execute arbitrary
Python code.

The updated packages have been patched to address this issue.

Affected versions: 10.2, 2006.0

Solution:
To upgrade automatically use MandrakeUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

https://secure1.securityspace.com/smysecure/catid.html?in=MDKSA-2005:187

Risk factor : High

CVSS Score:
5.1

Referencia Cruzada: BugTraq ID: 15000
Common Vulnerability Exposure (CVE) ID: CVE-2005-2966
http://www.securityfocus.com/bid/15000
Debian Security Information: DSA-1025 (Google Search)
http://www.debian.org/security/2006/dsa-1025
Debian Security Information: DSA-847 (Google Search)
http://www.debian.org/security/2005/dsa-847
http://www.gentoo.org/security/en/glsa/glsa-200510-06.xml
http://www.mandriva.com/security/advisories?name=MDKSA-2005:187
http://secunia.com/advisories/17047
http://secunia.com/advisories/17059
http://secunia.com/advisories/17083
http://secunia.com/advisories/17095
http://secunia.com/advisories/17108
SuSE Security Announcement: SUSE-SR:2005:022 (Google Search)
http://www.novell.com/linux/security/advisories/2005_22_sr.html
https://usn.ubuntu.com/193-1/
http://www.vupen.com/english/advisories/2005/1950
CopyrightCopyright (c) 2005 E-Soft Inc. http://www.securityspace.com

Esta es sólo una de 146377 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.