Anfälligkeitssuche        Suche in 219043 CVE Beschreibungen
und 99761 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.58074
Kategorie:Turbolinux Local Security Tests
Titel:Turbolinux TLSA-2007-14 (xorg-x11, XFree86)
Zusammenfassung:NOSUMMARY
Beschreibung:Description:

The remote host is missing an update to xorg-x11, XFree86
announced via advisory TLSA-2007-14.

The xorg-x11/XFree86 is an implementation of the X Window System, providing a core
graphical user interface and video drivers.

The xorg-x11 and XFree86 have Three integer overflow vulnerabilities.

This vulnerability may allow local users to execute arbitrary code
via a crafted X protocol request.

Solution: Please use the turbopkg (zabom) tool to apply the update.
https://secure1.securityspace.com/smysecure/catid.html?in=TLSA-2007-14

Risk factor : Critical

CVSS Score:
10.0

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2006-6101
BugTraq ID: 21968
http://www.securityfocus.com/bid/21968
Debian Security Information: DSA-1249 (Google Search)
https://www.debian.org/security/2007/dsa-1249
http://security.gentoo.org/glsa/glsa-200701-25.xml
HPdes Security Advisory: HPSBUX02225
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01075678
HPdes Security Advisory: SSRT071295
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=463
http://www.mandriva.com/security/advisories?name=MDKSA-2007:005
http://lists.freedesktop.org/archives/xorg-announce/2007-January/000235.html
NETBSD Security Advisory: NetBSD-SA2007-002
http://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2007-002.txt.asc
http://osvdb.org/32084
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10490
http://www.redhat.com/support/errata/RHSA-2007-0002.html
http://www.redhat.com/support/errata/RHSA-2007-0003.html
http://securitytracker.com/id?1017495
http://secunia.com/advisories/23633
http://secunia.com/advisories/23670
http://secunia.com/advisories/23684
http://secunia.com/advisories/23689
http://secunia.com/advisories/23698
http://secunia.com/advisories/23705
http://secunia.com/advisories/23758
http://secunia.com/advisories/23789
http://secunia.com/advisories/23966
http://secunia.com/advisories/24168
http://secunia.com/advisories/24210
http://secunia.com/advisories/24247
http://secunia.com/advisories/24401
http://secunia.com/advisories/25802
http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.393555
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102803-1
SuSE Security Announcement: SUSE-SA:2007:008 (Google Search)
http://www.novell.com/linux/security/advisories/2007_08_x.html
http://www.ubuntu.com/usn/usn-403-1
http://www.vupen.com/english/advisories/2007/0108
http://www.vupen.com/english/advisories/2007/0109
http://www.vupen.com/english/advisories/2007/0589
http://www.vupen.com/english/advisories/2007/0669
http://www.vupen.com/english/advisories/2007/2233
XForce ISS Database: xorg-xserver-render-overflow(31337)
https://exchange.xforce.ibmcloud.com/vulnerabilities/31337
Common Vulnerability Exposure (CVE) ID: CVE-2006-6102
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=464
http://osvdb.org/32085
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9991
XForce ISS Database: xorg-xserver-dbe-overflow(31376)
https://exchange.xforce.ibmcloud.com/vulnerabilities/31376
Common Vulnerability Exposure (CVE) ID: CVE-2006-6103
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=465
http://osvdb.org/32086
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11011
XForce ISS Database: xorg-xserver-dbe-swap-overflow(31379)
https://exchange.xforce.ibmcloud.com/vulnerabilities/31379
CopyrightCopyright (c) 2007 E-Soft Inc. http://www.securityspace.com

Dies ist nur einer von 99761 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2024 E-Soft Inc. Alle Rechte vorbehalten.