Anfälligkeitssuche        Suche in 219043 CVE Beschreibungen
und 99761 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.57229
Kategorie:Turbolinux Local Security Tests
Titel:Turbolinux TLSA-2006-5 (sendmail)
Zusammenfassung:NOSUMMARY
Beschreibung:Description:

The remote host is missing an update to sendmail
announced via advisory TLSA-2006-5.

Sendmail is a Mail Transport Agent, which is the program that moves mail
from one machine to another.
The vulnerabilities have been discovered in the signal handler race condition of sendmail.

These vulnerabilities may allow remote attackers to execute arbitrary code.

Solution: Please use the turbopkg (zabom) tool to apply the update.
https://secure1.securityspace.com/smysecure/catid.html?in=TLSA-2006-5

Risk factor : High

Querverweis: Common Vulnerability Exposure (CVE) ID: CAN-2006-0058
AIX APAR: IY82992
http://www-1.ibm.com/support/search.wss?rs=0&q=IY82992&apar=only
AIX APAR: IY82993
http://www-1.ibm.com/support/search.wss?rs=0&q=IY82993&apar=only
AIX APAR: IY82994
http://www-1.ibm.com/support/search.wss?rs=0&q=IY82994&apar=only
BugTraq ID: 17192
http://www.securityfocus.com/bid/17192
Bugtraq: 20060322 sendmail vuln advisories (CVE-2006-0058) (Google Search)
http://www.securityfocus.com/archive/1/428536/100/0/threaded
Cert/CC Advisory: TA06-081A
http://www.us-cert.gov/cas/techalerts/TA06-081A.html
CERT/CC vulnerability note: VU#834865
http://www.kb.cert.org/vuls/id/834865
Computer Incident Advisory Center Bulletin: Q-151
http://www.ciac.org/ciac/bulletins/q-151.shtml
Debian Security Information: DSA-1015 (Google Search)
http://www.debian.org/security/2006/dsa-1015
http://www.redhat.com/archives/fedora-announce-list/2006-April/msg00018.html
http://www.redhat.com/archives/fedora-announce-list/2006-April/msg00017.html
http://www.securityfocus.com/archive/1/428656/100/0/threaded
FreeBSD Security Advisory: FreeBSD-SA-06:13
ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:13.sendmail.asc
http://www.gentoo.org/security/en/glsa/glsa-200603-21.xml
HPdes Security Advisory: HPSBTU02116
http://itrc.hp.com/service/cki/docDisplay.do?docId=c00692635
HPdes Security Advisory: HPSBUX02108
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c00629555
HPdes Security Advisory: SSRT061133
HPdes Security Advisory: SSRT061135
ISS Security Advisory: 20060322 Sendmail Remote Signal Handling Vulnerability
http://www.iss.net/threats/216.html
http://www.mandriva.com/security/advisories?name=MDKSA-2006:058
NETBSD Security Advisory: NetBSD-SA2006-010
ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2006-010.txt.asc
OpenBSD Security Advisory: [3.8] 006: SECURITY FIX: March 25, 2006
http://www.openbsd.org/errata38.html#sendmail
http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.007-sendmail.html
http://www.osvdb.org/24037
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11074
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1689
http://www.redhat.com/support/errata/RHSA-2006-0264.html
http://www.redhat.com/support/errata/RHSA-2006-0265.html
SCO Security Bulletin: SCOSA-2006.24
ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.24/SCOSA-2006.24.txt
http://securitytracker.com/id?1015801
http://secunia.com/advisories/19342
http://secunia.com/advisories/19345
http://secunia.com/advisories/19346
http://secunia.com/advisories/19349
http://secunia.com/advisories/19356
http://secunia.com/advisories/19360
http://secunia.com/advisories/19361
http://secunia.com/advisories/19363
http://secunia.com/advisories/19367
http://secunia.com/advisories/19368
http://secunia.com/advisories/19394
http://secunia.com/advisories/19404
http://secunia.com/advisories/19407
http://secunia.com/advisories/19450
http://secunia.com/advisories/19466
http://secunia.com/advisories/19532
http://secunia.com/advisories/19533
http://secunia.com/advisories/19676
http://secunia.com/advisories/19774
http://secunia.com/advisories/20243
http://secunia.com/advisories/20723
SGI Security Advisory: 20060302-01-P
ftp://patches.sgi.com/support/free/security/advisories/20060302-01-P
SGI Security Advisory: 20060401-01-U
ftp://patches.sgi.com/support/free/security/advisories/20060401-01-U
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.619600
http://securityreason.com/securityalert/612
http://securityreason.com/securityalert/743
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102262-1
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102324-1
http://sunsolve.sun.com/search/document.do?assetkey=1-66-200494-1
SuSE Security Announcement: SUSE-SA:2006:017 (Google Search)
http://www.novell.com/linux/security/advisories/2006_17_sendmail.html
http://www.vupen.com/english/advisories/2006/1049
http://www.vupen.com/english/advisories/2006/1051
http://www.vupen.com/english/advisories/2006/1068
http://www.vupen.com/english/advisories/2006/1072
http://www.vupen.com/english/advisories/2006/1139
http://www.vupen.com/english/advisories/2006/1157
http://www.vupen.com/english/advisories/2006/1529
http://www.vupen.com/english/advisories/2006/2189
http://www.vupen.com/english/advisories/2006/2490
XForce ISS Database: smtp-timeout-bo(24584)
https://exchange.xforce.ibmcloud.com/vulnerabilities/24584
CopyrightCopyright (c) 2006 E-Soft Inc. http://www.securityspace.com

Dies ist nur einer von 99761 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2024 E-Soft Inc. Alle Rechte vorbehalten.