Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
146377 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.63523
Categoría:Mandrake Local Security Checks
Título:Mandrake Security Advisory MDVSA-2009:072 (perl-MDK-Common)
Resumen:The remote host is missing an update to perl-MDK-Common;announced via advisory MDVSA-2009:072.
Descripción:Summary:
The remote host is missing an update to perl-MDK-Common
announced via advisory MDVSA-2009:072.

Vulnerability Insight:
Some vulnerabilities were discovered and corrected in perl-MDK-Common:

The functions used to write strings into shell like configuration files
by Mandriva tools were not taking care of some special characters. This
could lead to some bugs (like wireless keys containing certain
characters not working), and privilege escalation. This update fixes
that issue by ensuring proper protection of strings.

The updated packages have been patched to correct these issues.

Affected: 2008.0, 2008.1, 2009.0, Corporate 3.0, Corporate 4.0,
Multi Network Firewall 2.0

Solution:
To upgrade automatically use MandrakeUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

CVSS Score:
7.2

CVSS Vector:
AV:L/AC:L/Au:N/C:C/I:C/A:C

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2009-0912
BugTraq ID: 34089
http://www.securityfocus.com/bid/34089
http://www.mandriva.com/security/advisories?name=MDVSA-2009:072
http://www.vupen.com/english/advisories/2009/0688
XForce ISS Database: perlmdkcommon-unspecified-priv-escalation(49220)
https://exchange.xforce.ibmcloud.com/vulnerabilities/49220
CopyrightCopyright (C) 2009 E-Soft Inc.

Esta es sólo una de 146377 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.