English | Deutsch | Español | Português
 ID de Usuario:
 Contraseña:
Nuevo usuario
 Acerca de:   Dedicada | Avanzada | Estándar | Periódica | Sin Riesgo | Escritorio | Básica | Individual | Sello | FAQ
  Resumen de Precio/Funciones | Ordenar  | Nuevas Vulnerabilidades | Confidencialidad | Búsqueda de Vulnerabilidad
 Búsqueda de    
Vulnerabilidad   
    Buscar 123947 Descripciones CVE y
58962 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.64155
Categoría:Ubuntu Local Security Checks
Título:Ubuntu USN-676-1 (webkit)
Resumen:Ubuntu USN-676-1 (webkit)
Descripción:Description:

The remote host is missing an update to webkit
announced via advisory USN-676-1.

Details follow:

It was discovered that WebKit did not properly handle Cascading Style Sheets
(CSS) import statements. If a user were tricked into opening a malicious
website, an attacker could cause a browser crash and possibly execute
arbitrary code with user privileges.

Solution:
The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 8.10:
libwebkit-1.0-1 1.0.1-2ubuntu0.1

After a standard system upgrade you need to restart any applications that
use WebKit, such as Epiphany-webkit and Midori, to effect the necessary
changes.

https://secure1.securityspace.com/smysecure/catid.html?in=USN-676-1

Risk factor : Critical

CVSS Score:
10.0

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2008-3632
http://lists.apple.com/archives/security-announce//2008/Sep/msg00003.html
http://lists.apple.com/archives/security-announce//2008/Sep/msg00004.html
http://lists.apple.com/archives/security-announce/2009/jun/msg00002.html
SuSE Security Announcement: SUSE-SR:2008:019 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00005.html
http://www.ubuntu.com/usn/USN-676-1
BugTraq ID: 31092
http://www.securityfocus.com/bid/31092
http://secunia.com/advisories/35379
http://secunia.com/advisories/32860
http://www.vupen.com/english/advisories/2008/2558
http://www.vupen.com/english/advisories/2008/2525
http://www.securitytracker.com/id?1020847
http://secunia.com/advisories/31900
http://secunia.com/advisories/31823
http://secunia.com/advisories/32099
http://www.vupen.com/english/advisories/2009/1522
Common Vulnerability Exposure (CVE) ID: CVE-2008-2927
Bugtraq: 20080625 Pidgin 2.4.1 Vulnerability (Google Search)
http://www.securityfocus.com/archive/1/493682
Bugtraq: 20080806 rPSA-2008-0246-1 gaim (Google Search)
http://www.securityfocus.com/archive/1/archive/1/495165/100/0/threaded
Bugtraq: 20080828 ZDI-08-054: Multiple Vendor libpurple MSN Protocol SLP Message Heap Overflow Vulnerability (Google Search)
http://www.securityfocus.com/archive/1/archive/1/495818/100/0/threaded
http://www.openwall.com/lists/oss-security/2008/07/04/1
http://www.openwall.com/lists/oss-security/2008/07/03/6
http://www.zerodayinitiative.com/advisories/ZDI-08-054
Debian Security Information: DSA-1610 (Google Search)
http://www.debian.org/security/2008/dsa-1610
http://www.mandriva.com/security/advisories?name=MDVSA-2008:143
http://www.mandriva.com/security/advisories?name=MDVSA-2009:127
http://www.redhat.com/support/errata/RHSA-2008-0584.html
http://www.ubuntu.com/usn/USN-675-1
http://www.ubuntu.com/usn/USN-675-2
BugTraq ID: 29956
http://www.securityfocus.com/bid/29956
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11695
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17972
http://secunia.com/advisories/32859
http://secunia.com/advisories/32861
http://www.vupen.com/english/advisories/2008/2032/references
http://www.securitytracker.com/id?1020451
http://secunia.com/advisories/30971
http://secunia.com/advisories/31016
http://secunia.com/advisories/31105
http://secunia.com/advisories/31387
http://secunia.com/advisories/31642
XForce ISS Database: adium-msnprotocol-code-execution(44774)
https://exchange.xforce.ibmcloud.com/vulnerabilities/44774
Common Vulnerability Exposure (CVE) ID: CVE-2008-2940
http://www.mandriva.com/security/advisories?name=MDVSA-2008:169
http://www.redhat.com/support/errata/RHSA-2008-0818.html
SuSE Security Announcement: SUSE-SR:2008:021 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00006.html
http://www.ubuntu.com/usn/USN-674-1
http://www.ubuntu.com/usn/USN-674-2
BugTraq ID: 30683
http://www.securityfocus.com/bid/30683
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10136
http://securitytracker.com/id?1020684
http://secunia.com/advisories/31470
http://secunia.com/advisories/31499
http://secunia.com/advisories/32316
http://secunia.com/advisories/32792
XForce ISS Database: hplip-alertmailing-privilege-escalation(44441)
https://exchange.xforce.ibmcloud.com/vulnerabilities/44441
Common Vulnerability Exposure (CVE) ID: CVE-2008-2941
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10636
http://securitytracker.com/id?1020683
XForce ISS Database: hplip-hpssd-dos(44440)
https://exchange.xforce.ibmcloud.com/vulnerabilities/44440
Common Vulnerability Exposure (CVE) ID: CVE-2008-3863
Bugtraq: 20081022 Secunia Research: GNU Enscript "setfilename" Special Escape Buffer Overflow (Google Search)
http://www.securityfocus.com/archive/1/archive/1/497647/100/0/threaded
Bugtraq: 20081117 rPSA-2008-0321-1 enscript (Google Search)
http://www.securityfocus.com/archive/1/archive/1/498385/100/0/threaded
http://secunia.com/secunia_research/2008-41/
http://lists.apple.com/archives/security-announce/2009/May/msg00002.html
Debian Security Information: DSA-1670 (Google Search)
http://www.debian.org/security/2008/dsa-1670
https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00014.html
https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00040.html
http://security.gentoo.org/glsa/glsa-200812-02.xml
http://www.mandriva.com/security/advisories?name=MDVSA-2008:243
http://www.redhat.com/support/errata/RHSA-2008-1016.html
RedHat Security Advisories: RHSA-2008:1021
http://rhn.redhat.com/errata/RHSA-2008-1021.html
SuSE Security Announcement: SUSE-SR:2008:024 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00000.html
http://www.ubuntu.com/usn/usn-660-1
Cert/CC Advisory: TA09-133A
http://www.us-cert.gov/cas/techalerts/TA09-133A.html
BugTraq ID: 31858
http://www.securityfocus.com/bid/31858
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9939
http://secunia.com/advisories/35074
http://secunia.com/advisories/32753
http://secunia.com/advisories/32854
http://www.vupen.com/english/advisories/2008/2891
http://secunia.com/advisories/32137
http://secunia.com/advisories/32530
http://secunia.com/advisories/33109
http://secunia.com/advisories/32970
http://secunia.com/advisories/32521
http://securityreason.com/securityalert/4488
http://www.vupen.com/english/advisories/2009/1297
XForce ISS Database: gnuenscript-readspecialescape-bo(46026)
https://exchange.xforce.ibmcloud.com/vulnerabilities/46026
Common Vulnerability Exposure (CVE) ID: CVE-2008-4306
http://osvdb.org/49569
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10718
Common Vulnerability Exposure (CVE) ID: CVE-2008-0017
ISS Security Advisory: 20081113 Mozilla Unchecked Allocation Remote Code Execution
http://www.iss.net/threats/311.html
https://bugzilla.mozilla.org/show_bug.cgi?id=443299
Debian Security Information: DSA-1669 (Google Search)
http://www.debian.org/security/2008/dsa-1669
Debian Security Information: DSA-1671 (Google Search)
http://www.debian.org/security/2008/dsa-1671
Debian Security Information: DSA-1697 (Google Search)
http://www.debian.org/security/2009/dsa-1697
https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00385.html
https://www.redhat.com/archives/fedora-package-announce/2008-November/msg00366.html
http://www.mandriva.com/security/advisories?name=MDVSA-2008:228
http://www.mandriva.com/security/advisories?name=MDVSA-2008:230
http://www.redhat.com/support/errata/RHSA-2008-0977.html
http://www.redhat.com/support/errata/RHSA-2008-0978.html
http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1
SuSE Security Announcement: SUSE-SA:2008:055 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00004.html
http://ubuntu.com/usn/usn-667-1
Cert/CC Advisory: TA08-319A
http://www.us-cert.gov/cas/techalerts/TA08-319A.html
BugTraq ID: 32281
http://www.securityfocus.com/bid/32281
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11005
http://www.securitytracker.com/id?1021185
http://secunia.com/advisories/34501
http://secunia.com/advisories/32684
http://secunia.com/advisories/32713
http://secunia.com/advisories/32778
http://secunia.com/advisories/32853
http://www.vupen.com/english/advisories/2008/3146
http://secunia.com/advisories/32721
http://secunia.com/advisories/32845
http://secunia.com/advisories/32693
http://secunia.com/advisories/32694
http://secunia.com/advisories/32695
http://secunia.com/advisories/32714
http://secunia.com/advisories/33433
http://www.vupen.com/english/advisories/2009/0977
Common Vulnerability Exposure (CVE) ID: CVE-2008-4582
Bugtraq: 20081007 Firefox Privacy Broken If Used to Open Web Page File (Google Search)
http://www.securityfocus.com/archive/1/archive/1/497091/100/0/threaded
http://liudieyu0.blog124.fc2.com/blog-entry-6.html
https://bugzilla.mozilla.org/show_bug.cgi?id=455311
Debian Security Information: DSA-1696 (Google Search)
http://www.debian.org/security/2009/dsa-1696
BugTraq ID: 31747
http://www.securityfocus.com/bid/31747
BugTraq ID: 31611
http://www.securityfocus.com/bid/31611
http://www.securitytracker.com/id?1021190
http://www.vupen.com/english/advisories/2008/2818
http://securitytracker.com/alerts/2008/Nov/1021212.html
http://secunia.com/advisories/32192
http://secunia.com/advisories/33434
http://securityreason.com/securityalert/4416
XForce ISS Database: firefox-internet-shortcut-info-disclosure(45740)
https://exchange.xforce.ibmcloud.com/vulnerabilities/45740
Common Vulnerability Exposure (CVE) ID: CVE-2008-5012
Bugtraq: 20081118 Firefox cross-domain image theft (CESA-2008-009) (Google Search)
http://www.securityfocus.com/archive/1/498468
https://bugzilla.mozilla.org/show_bug.cgi?id=355126
https://bugzilla.mozilla.org/show_bug.cgi?id=451619
http://scary.beasts.org/security/CESA-2008-009.html
http://scarybeastsecurity.blogspot.com/2008/11/firefox-cross-domain-image-theft-and.html
http://www.mandriva.com/security/advisories?name=MDVSA-2008:235
http://www.redhat.com/support/errata/RHSA-2008-0976.html
BugTraq ID: 32351
http://www.securityfocus.com/bid/32351
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10750
http://www.securitytracker.com/id?1021187
http://secunia.com/advisories/32798
http://secunia.com/advisories/32715
Common Vulnerability Exposure (CVE) ID: CVE-2008-5013
https://bugzilla.mozilla.org/show_bug.cgi?id=433610
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9660
http://www.securitytracker.com/id?1021181
Common Vulnerability Exposure (CVE) ID: CVE-2008-5014
https://bugzilla.mozilla.org/show_bug.cgi?id=436741
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9157
http://www.securitytracker.com/id?1021182
http://secunia.com/advisories/32011
Common Vulnerability Exposure (CVE) ID: CVE-2008-5017
https://bugzilla.mozilla.org/show_bug.cgi?id=455987
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11436
http://www.securitytracker.com/id?1021183
Common Vulnerability Exposure (CVE) ID: CVE-2008-5018
https://bugzilla.mozilla.org/show_bug.cgi?id=452786
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9872
Common Vulnerability Exposure (CVE) ID: CVE-2008-5021
https://bugzilla.mozilla.org/show_bug.cgi?id=460002
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9642
http://www.securitytracker.com/id?1021186
Common Vulnerability Exposure (CVE) ID: CVE-2008-5022
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11186
http://www.securitytracker.com/id?1021188
Common Vulnerability Exposure (CVE) ID: CVE-2008-5023
https://bugzilla.mozilla.org/show_bug.cgi?id=424733
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9908
http://www.securitytracker.com/id?1021189
Common Vulnerability Exposure (CVE) ID: CVE-2008-5024
https://bugzilla.mozilla.org/show_bug.cgi?id=453915
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9063
http://www.securitytracker.com/id?1021192
Common Vulnerability Exposure (CVE) ID: CVE-2008-2237
Debian Security Information: DSA-1661 (Google Search)
http://www.debian.org/security/2008/dsa-1661
https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00905.html
https://www.redhat.com/archives/fedora-package-announce/2008-October/msg00923.html
http://security.gentoo.org/glsa/glsa-200812-13.xml
http://www.redhat.com/support/errata/RHSA-2008-0939.html
http://sunsolve.sun.com/search/document.do?assetkey=1-26-242627-1
SuSE Security Announcement: SUSE-SR:2008:026 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-11/msg00002.html
http://www.ubuntu.com/usn/usn-677-2
http://www.ubuntu.com/usn/usn-677-1
BugTraq ID: 31962
http://www.securityfocus.com/bid/31962
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10784
http://secunia.com/advisories/32463
http://secunia.com/advisories/32856
http://www.vupen.com/english/advisories/2008/2947
http://www.vupen.com/english/advisories/2008/3103
http://www.securitytracker.com/id?1021120
http://secunia.com/advisories/32419
http://secunia.com/advisories/32461
http://secunia.com/advisories/32489
http://secunia.com/advisories/32676
http://secunia.com/advisories/32872
http://secunia.com/advisories/33140
XForce ISS Database: openoffice-wmf-bo(46165)
https://exchange.xforce.ibmcloud.com/vulnerabilities/46165
Common Vulnerability Exposure (CVE) ID: CVE-2008-2238
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=750
http://sunsolve.sun.com/search/document.do?assetkey=1-26-243226-1
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10849
http://www.vupen.com/english/advisories/2008/3153
http://www.securitytracker.com/id?1021121
XForce ISS Database: openoffice-emf-file-bo(46166)
https://exchange.xforce.ibmcloud.com/vulnerabilities/46166
Common Vulnerability Exposure (CVE) ID: CVE-2008-4937
http://www.openwall.com/lists/oss-security/2008/10/30/2
http://uvw.ru/report.lenny.txt
http://www.mandriva.com/security/advisories?name=MDVSA-2009:070
BugTraq ID: 30925
http://www.securityfocus.com/bid/30925
XForce ISS Database: openoffice-senddoc-symlink(44829)
https://exchange.xforce.ibmcloud.com/vulnerabilities/44829
CopyrightCopyright (c) 2009 E-Soft Inc. http://www.securityspace.com

Esta es sólo una de 58962 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.

Registro de Nuevo Usuario
Email:
Usuario:
Contraseña:
Envíeme por email sus boletines mensuales, informándome los últimos servicios, mejoras y encuestas.
Por favor envíeme por email un anuncio de prueba de vulnerabilidades siempre que se agregue una nueva prueba.
   Privacidad
Ingreso de Usuario Registrado
 
Usuario:   
Contraseña:  

 ¿Olvidó su usuario o contraseña??
Email/ID de Usario:




Principal | Acerca de Nosotros | Contáctenos | Programas de Asociado | Developer APIs | Privacidad | Listas de Correo | Abuso
Auditorías de Seguridad | DNS Administrado | Monitoreo de Red | Analizador de Sitio | Informes de Investigación de Internet
Prueba de Web | Whois

© 1998-2018 E-Soft Inc. Todos los derechos reservados.