Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
146377 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.68030
Categoría:Mandrake Local Security Checks
Título:Mandriva Security Advisory MDVSA-2010:181 (ntop)
Resumen:NOSUMMARY
Descripción:Description:
The remote host is missing an update to ntop
announced via advisory MDVSA-2010:181.

A vulnerability has been found and corrected in ntop:

The checkHTTPpassword function in http.c in ntop 3.3.10 and earlier
allows remote attackers to cause a denial of service (NULL pointer
dereference and daemon crash) via an Authorization HTTP header
that lacks a : (colon) character in the base64-decoded string
(CVE-2009-2732).

The updated packages have been patched to correct this issue.

Affected: Corporate 4.0

Solution:
To upgrade automatically use MandrakeUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2010:181

Risk factor : Medium

CVSS Score:
5.0

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2009-2732
Bugtraq: 20090818 (Reposting truncated message) Re: ntop <= 3.3.10 Basic Authentication Null Pointer Denial of Service (Google Search)
http://www.securityfocus.com/archive/1/505876/100/0/threaded
Bugtraq: 20090818 ntop <= 3.3.10 Basic Authentication Null Pointer Denial of Service (Google Search)
http://www.securityfocus.com/archive/1/505862/100/0/threaded
http://www.mandriva.com/security/advisories?name=MDVSA-2010:181
http://secunia.com/advisories/36403
http://www.vupen.com/english/advisories/2009/2317
CopyrightCopyright (c) 2010 E-Soft Inc. http://www.securityspace.com

Esta es sólo una de 146377 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.