![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.66552 |
Categoría: | Mandrake Local Security Checks |
Título: | Mandriva Security Advisory MDVSA-2009:344 (perl-DBD-Pg) |
Resumen: | The remote host is missing an update to perl-DBD-Pg;announced via advisory MDVSA-2009:344. |
Descripción: | Summary: The remote host is missing an update to perl-DBD-Pg announced via advisory MDVSA-2009:344. Vulnerability Insight: Multiple vulnerabilities was discovered and corrected in perl-DBD-Pg: Heap-based buffer overflow in the DBD::Pg module for Perl might allow context-dependent attackers to execute arbitrary code via unspecified input to an application that uses the getline and pg_getline functions to read database rows. Memory leak in the dequote_bytea function in quote.c in the DBD::Pg (aka DBD-Pg or libdbd-pg-perl) module before 2.0.0 for Perl allows context-dependent attackers to cause a denial of service (memory consumption) by fetching data with BYTEA columns (CVE-2009-1341). Packages for 2008.0 are provided for Corporate Desktop 2008.0 customers. This update provides a fix for these vulnerabilities. Affected: 2008.0 Solution: To upgrade automatically use MandrakeUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. CVSS Score: 7.5 CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2009-1341 BugTraq ID: 34757 http://www.securityfocus.com/bid/34757 Debian Security Information: DSA-1780 (Google Search) http://www.debian.org/security/2009/dsa-1780 https://launchpad.net/bugs/cve/2009-1341 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9680 http://www.redhat.com/support/errata/RHSA-2009-0479.html http://www.redhat.com/support/errata/RHSA-2009-1067.html http://secunia.com/advisories/34909 http://secunia.com/advisories/35058 http://secunia.com/advisories/35685 SuSE Security Announcement: SUSE-SR:2009:012 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html XForce ISS Database: libdbdpgperl-dequotebytea-dos(50387) https://exchange.xforce.ibmcloud.com/vulnerabilities/50387 Common Vulnerability Exposure (CVE) ID: CVE-2009-0663 BugTraq ID: 34755 http://www.securityfocus.com/bid/34755 https://launchpad.net/bugs/cve/2009-0663 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9499 XForce ISS Database: libdbdpgperl-unspecified-bo(50467) https://exchange.xforce.ibmcloud.com/vulnerabilities/50467 |
Copyright | Copyright (C) 2009 E-Soft Inc. |
Esta es sólo una de 146377 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |