Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.57545
Category:Trustix Local Security Checks
Title:Trustix Security Advisory TSLSA-2006-0057 (Multiple packages)
Summary:NOSUMMARY
Description:Description:

The remote host is missing updates announced in
advisory TSLSA-2006-0057.

Packages affected are:
clamav < TSL 3.0 > < TSL 2.2 >
kernel < TSL 2.2 >
kernel < TSL 3.0 >
php < TSL 3.0 > < TSL 2.2 >
php4 < TSL 2.2 >
python < TSL 3.0 > < TSL 2.2 > < TSEL 2 >
xorg-x11 < TSL 3.0 >

For details, please visit the referenced security advisories.

Solution:
Update your system with the packages as indicated in
the referenced security advisory.

https://secure1.securityspace.com/smysecure/catid.html?in=TSLSA-2006-0057

Risk factor : High

CVSS Score:
7.8

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2006-4997
BugTraq ID: 20363
http://www.securityfocus.com/bid/20363
Bugtraq: 20070615 rPSA-2007-0124-1 kernel xen (Google Search)
http://www.securityfocus.com/archive/1/471457
Debian Security Information: DSA-1233 (Google Search)
http://www.us.debian.org/security/2006/dsa-1233
Debian Security Information: DSA-1237 (Google Search)
http://www.us.debian.org/security/2006/dsa-1237
http://www.mandriva.com/security/advisories?name=MDKSA-2006:197
http://www.mandriva.com/security/advisories?name=MDKSA-2007:012
http://www.mandriva.com/security/advisories?name=MDKSA-2007:025
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10388
http://www.redhat.com/support/errata/RHSA-2006-0689.html
http://www.redhat.com/support/errata/RHSA-2006-0710.html
http://www.redhat.com/support/errata/RHSA-2007-0012.html
http://www.redhat.com/support/errata/RHSA-2007-0013.html
http://securitytracker.com/id?1017526
http://secunia.com/advisories/22253
http://secunia.com/advisories/22279
http://secunia.com/advisories/22292
http://secunia.com/advisories/22497
http://secunia.com/advisories/22762
http://secunia.com/advisories/22945
http://secunia.com/advisories/23064
http://secunia.com/advisories/23370
http://secunia.com/advisories/23384
http://secunia.com/advisories/23395
http://secunia.com/advisories/23474
http://secunia.com/advisories/23752
http://secunia.com/advisories/23788
http://secunia.com/advisories/24288
http://secunia.com/advisories/25691
SuSE Security Announcement: SUSE-SA:2006:079 (Google Search)
http://www.novell.com/linux/security/advisories/2006_79_kernel.html
http://www.ubuntu.com/usn/usn-395-1
http://www.vupen.com/english/advisories/2006/3937
http://www.vupen.com/english/advisories/2006/3999
XForce ISS Database: kernel-clipmkip-dos(29387)
https://exchange.xforce.ibmcloud.com/vulnerabilities/29387
Common Vulnerability Exposure (CVE) ID: CVE-2006-4623
BugTraq ID: 19939
http://www.securityfocus.com/bid/19939
Bugtraq: 20061017 rPSA-2006-0194-1 kernel (Google Search)
http://www.securityfocus.com/archive/1/448998/100/0/threaded
Debian Security Information: DSA-1304 (Google Search)
http://www.debian.org/security/2007/dsa-1304
http://www.mandriva.com/security/advisories?name=MDKSA-2006:182
http://lkml.org/lkml/2006/8/20/278
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9775
http://secunia.com/advisories/21820
http://secunia.com/advisories/22382
http://secunia.com/advisories/22441
http://secunia.com/advisories/25714
http://secunia.com/advisories/26139
http://www.ubuntu.com/usn/usn-489-1
http://www.vupen.com/english/advisories/2006/3551
Common Vulnerability Exposure (CVE) ID: CVE-2006-4625
BugTraq ID: 19933
http://www.securityfocus.com/bid/19933
Bugtraq: 20060913 Re: PHP 5.1.6 / 4.4.4 Critical php_admin* bypass by ini_restore() (Google Search)
http://www.securityfocus.com/archive/1/445712/100/0/threaded
http://www.securityfocus.com/archive/1/445882/100/0/threaded
HPdes Security Advisory: HPSBMA02215
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01056506
HPdes Security Advisory: HPSBTU02232
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01086137
HPdes Security Advisory: SSRT071423
HPdes Security Advisory: SSRT071429
http://www.mandriva.com/security/advisories?name=MDKSA-2006:185
http://www.securityfocus.com/archive/1/448953/100/0/threaded
http://secunia.com/advisories/22282
http://secunia.com/advisories/22331
http://secunia.com/advisories/22338
http://secunia.com/advisories/22424
http://secunia.com/advisories/25423
http://secunia.com/advisories/25850
http://securityreason.com/securityalert/1519
http://securityreason.com/achievement_securityalert/42
SuSE Security Announcement: SUSE-SA:2006:059 (Google Search)
http://lists.suse.com/archive/suse-security-announce/2006-Oct/0002.html
TurboLinux Advisory: TLSA-2006-38
http://www.turbolinux.com/security/2006/TLSA-2006-38.txt
http://www.ubuntu.com/usn/usn-362-1
http://www.vupen.com/english/advisories/2007/1991
http://www.vupen.com/english/advisories/2007/2374
XForce ISS Database: php-inirestore-security-bypass(28853)
https://exchange.xforce.ibmcloud.com/vulnerabilities/28853
Common Vulnerability Exposure (CVE) ID: CVE-2006-4980
BugTraq ID: 20376
http://www.securityfocus.com/bid/20376
Bugtraq: 20061011 rPSA-2006-0187-1 idle python (Google Search)
http://www.securityfocus.com/archive/1/448244/100/100/threaded
Bugtraq: 20070110 VMware ESX server security updates (Google Search)
http://www.securityfocus.com/archive/1/456546/100/200/threaded
Debian Security Information: DSA-1197 (Google Search)
http://www.debian.org/security/2006/dsa-1197
Debian Security Information: DSA-1198 (Google Search)
http://www.debian.org/security/2006/dsa-1198
http://security.gentoo.org/glsa/glsa-200610-07.xml
http://www.mandriva.com/security/advisories?name=MDKSA-2006:181
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10789
http://www.redhat.com/support/errata/RHSA-2006-0713.html
http://www.redhat.com/support/errata/RHSA-2008-0629.html
http://securitytracker.com/id?1017019
http://secunia.com/advisories/22276
http://secunia.com/advisories/22297
http://secunia.com/advisories/22303
http://secunia.com/advisories/22357
http://secunia.com/advisories/22358
http://secunia.com/advisories/22379
http://secunia.com/advisories/22448
http://secunia.com/advisories/22487
http://secunia.com/advisories/22512
http://secunia.com/advisories/22531
http://secunia.com/advisories/22639
http://secunia.com/advisories/23680
http://secunia.com/advisories/31492
SGI Security Advisory: 20061001-01-P
ftp://patches.sgi.com/support/free/security/advisories/20061001-01-P.asc
SuSE Security Announcement: SUSE-SR:2006:025 (Google Search)
http://www.novell.com/linux/security/advisories/2006_25_sr.html
http://www.ubuntu.com/usn/usn-359-1
http://www.vupen.com/english/advisories/2006/3940
http://www.vupen.com/english/advisories/2006/5131
XForce ISS Database: python-repr-bo(29408)
https://exchange.xforce.ibmcloud.com/vulnerabilities/29408
Common Vulnerability Exposure (CVE) ID: CVE-2006-3740
1016828
http://securitytracker.com/id?1016828
102780
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102780-1
19974
http://www.securityfocus.com/bid/19974
20060912 Multiple Vendor X Server CID-keyed Fonts 'scan_cidfont()' Integer Overflow Vulnerability
http://www.idefense.com/intelligence/vulnerabilities/display.php?id=411
20060912 rPSA-2006-0167-1 xorg-x11 xorg-x11-fonts xorg-x11-tools xorg-x11-xfs
http://www.securityfocus.com/archive/1/445812/100/0/threaded
20070330 VMSA-2007-0002 VMware ESX security updates
http://www.securityfocus.com/archive/1/464268/100/0/threaded
21864
http://secunia.com/advisories/21864
21889
http://secunia.com/advisories/21889
21890
http://secunia.com/advisories/21890
21894
http://secunia.com/advisories/21894
21900
http://secunia.com/advisories/21900
21904
http://secunia.com/advisories/21904
21908
http://secunia.com/advisories/21908
21924
http://secunia.com/advisories/21924
22080
http://secunia.com/advisories/22080
22141
http://secunia.com/advisories/22141
22332
http://secunia.com/advisories/22332
22560
http://secunia.com/advisories/22560
23033
http://secunia.com/advisories/23033
23899
http://secunia.com/advisories/23899
23907
http://secunia.com/advisories/23907
24636
http://secunia.com/advisories/24636
ADV-2006-3581
http://www.vupen.com/english/advisories/2006/3581
ADV-2006-3582
http://www.vupen.com/english/advisories/2006/3582
ADV-2007-0322
http://www.vupen.com/english/advisories/2007/0322
ADV-2007-1171
http://www.vupen.com/english/advisories/2007/1171
DSA-1193
http://www.debian.org/security/2006/dsa-1193
GLSA-200609-07
http://security.gentoo.org/glsa/glsa-200609-07.xml
MDKSA-2006:164
http://www.mandriva.com/security/advisories?name=MDKSA-2006:164
RHSA-2006:0665
http://www.redhat.com/support/errata/RHSA-2006-0665.html
RHSA-2006:0666
http://www.redhat.com/support/errata/RHSA-2006-0666.html
SUSE-SR:2006:023
http://www.novell.com/linux/security/advisories/2006_23_sr.html
USN-344-1
http://www.ubuntu.com/usn/usn-344-1
http://support.avaya.com/elmodocs2/security/ASA-2006-190.htm
http://support.avaya.com/elmodocs2/security/ASA-2006-191.htm
http://www.vmware.com/support/esx25/doc/esx-254-200702-patch.html
https://issues.rpath.com/browse/RPL-614
oval:org.mitre.oval:def:9454
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9454
xorg-server-scancidfont-overflow(28890)
https://exchange.xforce.ibmcloud.com/vulnerabilities/28890
Common Vulnerability Exposure (CVE) ID: CVE-2006-3739
102714
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102714-1
20060912 Multiple Vendor X Server CID-keyed Fonts 'CIDAFM()' Integer Overflow Vulnerability
http://www.idefense.com/intelligence/vulnerabilities/display.php?id=412
oval:org.mitre.oval:def:10305
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10305
xorg-server-cidafm-overflow(28899)
https://exchange.xforce.ibmcloud.com/vulnerabilities/28899
Common Vulnerability Exposure (CVE) ID: CVE-2006-4447
BugTraq ID: 19742
http://www.securityfocus.com/bid/19742
BugTraq ID: 23697
http://www.securityfocus.com/bid/23697
CERT/CC vulnerability note: VU#300368
http://www.kb.cert.org/vuls/id/300368
Debian Security Information: DSA-1193 (Google Search)
http://security.gentoo.org/glsa/glsa-200608-25.xml
http://security.gentoo.org/glsa/glsa-200704-22.xml
http://www.mandriva.com/security/advisories?name=MDKSA-2006:160
http://mail.gnome.org/archives/beast/2006-December/msg00025.html
http://lists.freedesktop.org/archives/xorg/2006-June/016146.html
http://secunia.com/advisories/21650
http://secunia.com/advisories/21660
http://secunia.com/advisories/21693
http://secunia.com/advisories/25032
http://secunia.com/advisories/25059
http://www.vupen.com/english/advisories/2006/3409
http://www.vupen.com/english/advisories/2007/0409
Common Vulnerability Exposure (CVE) ID: CVE-2006-3467
1016522
http://securitytracker.com/id?1016522
102705
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102705-1
2006-0052
http://www.trustix.org/errata/2006/0052/
20060701-01-U
ftp://patches.sgi.com/support/free/security/advisories/20060701-01-U
20060825 rPSA-2006-0157-1 xorg-x11 xorg-x11-fonts xorg-x11-tools xorg-x11-xfs
http://www.securityfocus.com/archive/1/444318/100/0/threaded
20061113 VMSA-2006-0005 - VMware ESX Server 2.5.4 Upgrade Patch 1
http://www.securityfocus.com/archive/1/451419/100/200/threaded
20061113 VMSA-2006-0006 - VMware ESX Server 2.5.3 Upgrade Patch 4
http://www.securityfocus.com/archive/1/451404/100/0/threaded
20061113 VMSA-2006-0007 - VMware ESX Server 2.1.3 Upgrade Patch 2
http://www.securityfocus.com/archive/1/451417/100/200/threaded
20061113 VMSA-2006-0008 - VMware ESX Server 2.0.2 Upgrade Patch 2
http://www.securityfocus.com/archive/1/451426/100/200/threaded
21062
http://secunia.com/advisories/21062
21135
http://secunia.com/advisories/21135
21144
http://secunia.com/advisories/21144
21232
http://secunia.com/advisories/21232
21285
http://secunia.com/advisories/21285
21566
http://secunia.com/advisories/21566
21567
http://secunia.com/advisories/21567
21606
http://secunia.com/advisories/21606
21626
http://secunia.com/advisories/21626
21701
http://secunia.com/advisories/21701
21793
http://secunia.com/advisories/21793
21798
http://secunia.com/advisories/21798
21836
http://secunia.com/advisories/21836
22027
http://secunia.com/advisories/22027
22875
http://secunia.com/advisories/22875
22907
http://secunia.com/advisories/22907
23400
http://secunia.com/advisories/23400
23939
http://secunia.com/advisories/23939
27271
http://secunia.com/advisories/27271
33937
http://secunia.com/advisories/33937
ADV-2006-4502
http://www.vupen.com/english/advisories/2006/4502
ADV-2006-4522
http://www.vupen.com/english/advisories/2006/4522
ADV-2007-0381
http://www.vupen.com/english/advisories/2007/0381
APPLE-SA-2009-02-12
http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html
DSA-1178
http://www.debian.org/security/2006/dsa-1178
GLSA-200609-04
http://security.gentoo.org/glsa/glsa-200609-04.xml
MDKSA-2006:129
http://www.mandriva.com/security/advisories?name=MDKSA-2006:129
MDKSA-2006:148
http://www.mandriva.com/security/advisories?name=MDKSA-2006:148
RHSA-2006:0500
http://www.redhat.com/support/errata/RHSA-2006-0500.html
RHSA-2006:0634
http://www.redhat.com/support/errata/RHSA-2006-0634.html
RHSA-2006:0635
http://www.redhat.com/support/errata/RHSA-2006-0635.html
SUSE-SA:2006:045
http://lists.suse.com/archive/suse-security-announce/2006-Aug/0002.html
SUSE-SR:2007:021
http://lists.opensuse.org/opensuse-security-announce/2007-10/msg00006.html
USN-324-1
http://www.ubuntu.com/usn/usn-324-1
USN-341-1
http://www.ubuntu.com/usn/usn-341-1
http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=190593
http://support.apple.com/kb/HT3438
http://support.avaya.com/elmodocs2/security/ASA-2006-176.htm
http://support.avaya.com/elmodocs2/security/ASA-2006-186.htm
http://support.avaya.com/elmodocs2/security/ASA-2006-284.htm
http://www.vmware.com/download/esx/esx-202-200610-patch.html
http://www.vmware.com/download/esx/esx-213-200610-patch.html
http://www.vmware.com/download/esx/esx-254-200610-patch.html
oval:org.mitre.oval:def:10673
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10673
CopyrightCopyright (c) 2006 E-Soft Inc. http://www.securityspace.com

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.