English | Deutsch | Español | Português
 UserID:
 Passwd:
new user
 About:   Dedicated  | Advanced  | Standard  | Recurring  | No Risk  | Desktop  | Basic  | Single  | Security Seal  | FAQ
  Price/Feature Summary  | Order  | New Vulnerabilities  | Confidentiality  | Vulnerability Search
 Vulnerability   
Search   
    Search 89547 CVE descriptions
and 49323 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.58428
Category:Gentoo Local Security Checks
Title:Gentoo Security Advisory GLSA 200706-08 (emul-linux-x86-java)
Summary:Gentoo Security Advisory GLSA 200706-08 (emul-linux-x86-java)
Description:Description:
The remote host is missing updates announced in
advisory GLSA 200706-08.

Multiple vulnerabilities have been discovered in emul-linux-x86-java,
possibly resulting in the execution of arbitrary code or a Denial of
Service.

Solution:
All Emul-linux-x86-java users should upgrade to the latest version:

# emerge --sync
# emerge --ask --oneshot --verbose '>=app-emulation/emul-linux-x86-java-1.5.0.11'

https://secure1.securityspace.com/smysecure/catid.html?in=GLSA%20200706-08
http://bugs.gentoo.org/show_bug.cgi?id=178962

CVSS Score:
10.0

CVSS Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2007-2435
http://docs.info.apple.com/article.html?artnum=307177
http://lists.apple.com/archives/Security-announce/2007/Dec/msg00001.html
http://dev2dev.bea.com/pub/advisory/241
http://www.gentoo.org/security/en/glsa/glsa-200705-23.xml
http://security.gentoo.org/glsa/glsa-200706-08.xml
http://www.gentoo.org/security/en/glsa/glsa-200804-20.xml
http://security.gentoo.org/glsa/glsa-200804-28.xml
http://www.gentoo.org/security/en/glsa/glsa-200806-11.xml
http://www.redhat.com/support/errata/RHSA-2007-0817.html
http://www.redhat.com/support/errata/RHSA-2007-0829.html
http://www.redhat.com/support/errata/RHSA-2008-0261.html
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102881-1
BugTraq ID: 23728
http://www.securityfocus.com/bid/23728
http://osvdb.org/35483
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10999
http://www.vupen.com/english/advisories/2007/1598
http://www.vupen.com/english/advisories/2007/1814
http://www.vupen.com/english/advisories/2007/4224
http://www.securitytracker.com/id?1017986
http://secunia.com/advisories/25069
http://secunia.com/advisories/25283
http://secunia.com/advisories/25413
http://secunia.com/advisories/25474
http://secunia.com/advisories/25832
http://secunia.com/advisories/26311
http://secunia.com/advisories/26369
http://secunia.com/advisories/28115
http://secunia.com/advisories/29858
http://secunia.com/advisories/30780
XForce ISS Database: javawebstart-classes-privilege-escalation(33984)
http://xforce.iss.net/xforce/xfdb/33984
Common Vulnerability Exposure (CVE) ID: CVE-2007-2788
http://lists.vmware.com/pipermail/security-announce/2008/000003.html
http://scary.beasts.org/security/CESA-2006-004.html
http://dev2dev.bea.com/pub/advisory/248
http://www.gentoo.org/security/en/glsa/glsa-200709-15.xml
http://www.redhat.com/support/errata/RHSA-2007-0956.html
http://www.redhat.com/support/errata/RHSA-2007-1086.html
http://www.redhat.com/support/errata/RHSA-2008-0100.html
http://www.redhat.com/support/errata/RHSA-2008-0133.html
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102934-1
http://sunsolve.sun.com/search/document.do?assetkey=1-66-200856-1
SuSE Security Announcement: SUSE-SA:2007:045 (Google Search)
http://www.novell.com/linux/security/advisories/2007_45_java.html
SuSE Security Announcement: SUSE-SA:2007:056 (Google Search)
http://www.novell.com/linux/security/advisories/2007_56_ibmjava.html
CERT/CC vulnerability note: VU#138545
http://www.kb.cert.org/vuls/id/138545
http://www.attrition.org/pipermail/vim/2007-July/001696.html
http://www.attrition.org/pipermail/vim/2007-July/001697.html
http://www.attrition.org/pipermail/vim/2007-July/001708.html
http://www.attrition.org/pipermail/vim/2007-December/001862.html
BugTraq ID: 24004
http://www.securityfocus.com/bid/24004
BugTraq ID: 24267
http://www.securityfocus.com/bid/24267
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11700
http://www.vupen.com/english/advisories/2007/1836
http://www.vupen.com/english/advisories/2007/3009
http://www.vupen.com/english/advisories/2008/0065
http://www.securitytracker.com/id?1018182
http://secunia.com/advisories/25295
http://secunia.com/advisories/26049
http://secunia.com/advisories/26119
http://secunia.com/advisories/26933
http://secunia.com/advisories/27203
http://secunia.com/advisories/27266
http://secunia.com/advisories/26645
http://secunia.com/advisories/28056
http://secunia.com/advisories/26631
http://secunia.com/advisories/28365
http://secunia.com/advisories/29340
http://secunia.com/advisories/30805
XForce ISS Database: sunjava-iccprofile-overflow(34318)
http://xforce.iss.net/xforce/xfdb/34318
XForce ISS Database: sun-java-image-bo(34652)
http://xforce.iss.net/xforce/xfdb/34652
Common Vulnerability Exposure (CVE) ID: CVE-2007-2789
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10800
XForce ISS Database: sunjava-bmp-dos(34320)
http://xforce.iss.net/xforce/xfdb/34320
XForce ISS Database: sun-java-virtual-machine-dos(34654)
http://xforce.iss.net/xforce/xfdb/34654
CopyrightCopyright (c) 2007 E-Soft Inc. http://www.securityspace.com

This is only one of 49323 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

New User Registration
Email:
UserID:
Passwd:
Please email me your monthly newsletters, informing the latest services, improvements & surveys.
Please email me a vulnerability test announcement whenever a new test is added.
   Privacy
Registered User Login
 
UserID:   
Passwd:  

 Forgot userid or passwd?
Email/Userid:




Home | About Us | Contact Us | Partner Programs | Developer APIs | Privacy | Mailing Lists | Abuse
Security Audits | Managed DNS | Network Monitoring | Site Analyzer | Internet Research Reports
Web Probe | Whois

© 1998-2016 E-Soft Inc. All rights reserved.