Executive Summary
Summary | |
---|---|
Title | VMware Player, Server, Workstation: Multiple vulnerabilities |
Informations | |||
---|---|---|---|
Name | GLSA-201209-25 | First vendor Publication | 2012-09-29 |
Vendor | Gentoo | Last vendor Modification | 2012-09-29 |
Severity (Vendor) | High | Revision | N/A |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 10 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Synopsis Multiple vulnerabilities have been found in VMware Player, Server, and Workstation, allowing remote and local attackers to conduct several attacks, including privilege escalation, remote execution of arbitrary code, and a Denial of Service. Background Description Impact A remote attacker could entice a user to open a specially crafted file, possibly resulting in the remote execution of arbitrary code, or a Denial of Service. Remote attackers also may be able to spoof DNS traffic, read arbitrary files, or inject arbitrary web script to the VMware Server Console. Furthermore, guest OS users may be able to execute arbitrary code on the host OS, gain escalated privileges on the guest OS, or cause a Denial of Service (crash the host OS). Workaround Resolution NOTE: Users could upgrade to ">=app-emulation/vmware-player-3.1.5", however these packages are not currently stable. Gentoo discontinued support for VMware Workstation. We recommend that users unmerge VMware Workstation: NOTE: Users could upgrade to Gentoo discontinued support for VMware Server. We recommend that users unmerge VMware Server: References Availability http://security.gentoo.org/glsa/glsa-201209-25.xml |
Original Source
Url : http://security.gentoo.org/glsa/glsa-201209-25.xml |
CAPEC : Common Attack Pattern Enumeration & Classification
Id | Name |
---|---|
CAPEC-234 | Hijacking a privileged process |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
22 % | CWE-264 | Permissions, Privileges, and Access Controls |
16 % | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
12 % | CWE-189 | Numeric Errors (CWE/SANS Top 25) |
12 % | CWE-134 | Uncontrolled Format String (CWE/SANS Top 25) |
9 % | CWE-399 | Resource Management Errors |
6 % | CWE-200 | Information Exposure |
6 % | CWE-79 | Failure to Preserve Web Page Structure ('Cross-site Scripting') (CWE/SANS Top 25) |
6 % | CWE-20 | Improper Input Validation |
3 % | CWE-331 | Insufficient Entropy |
3 % | CWE-22 | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') (CWE/SANS Top 25) |
3 % | CWE-16 | Configuration |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:10316 | |||
Oval ID: | oval:org.mitre.oval:def:10316 | ||
Title: | The PNG reference library (aka libpng) before 1.0.43, and 1.2.x before 1.2.35, as used in pngcrush and other applications, allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PNG file that triggers a free of an uninitialized pointer in (1) the png_read_png function, (2) pCAL chunk handling, or (3) setup of 16-bit gamma tables. | ||
Description: | The PNG reference library (aka libpng) before 1.0.43, and 1.2.x before 1.2.35, as used in pngcrush and other applications, allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PNG file that triggers a free of an uninitialized pointer in (1) the png_read_png function, (2) pCAL chunk handling, or (3) setup of 16-bit gamma tables. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2009-0040 | Version: | 5 |
Platform(s): | Red Hat Enterprise Linux 3 CentOS Linux 3 Red Hat Enterprise Linux 4 CentOS Linux 4 Oracle Linux 4 Red Hat Enterprise Linux 5 CentOS Linux 5 Oracle Linux 5 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:10614 | |||
Oval ID: | oval:org.mitre.oval:def:10614 | ||
Title: | Certain chunk handlers in libpng before 1.0.29 and 1.2.x before 1.2.21 allow remote attackers to cause a denial of service (crash) via crafted (1) pCAL (png_handle_pCAL), (2) sCAL (png_handle_sCAL), (3) tEXt (png_push_read_tEXt), (4) iTXt (png_handle_iTXt), and (5) ztXT (png_handle_ztXt) chunking in PNG images, which trigger out-of-bounds read operations. | ||
Description: | Certain chunk handlers in libpng before 1.0.29 and 1.2.x before 1.2.21 allow remote attackers to cause a denial of service (crash) via crafted (1) pCAL (png_handle_pCAL), (2) sCAL (png_handle_sCAL), (3) tEXt (png_push_read_tEXt), (4) iTXt (png_handle_iTXt), and (5) ztXT (png_handle_ztXt) chunking in PNG images, which trigger out-of-bounds read operations. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2007-5269 | Version: | 5 |
Platform(s): | Red Hat Enterprise Linux 3 CentOS Linux 3 Red Hat Enterprise Linux 4 CentOS Linux 4 Oracle Linux 4 Red Hat Enterprise Linux 5 CentOS Linux 5 Oracle Linux 5 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:11188 | |||
Oval ID: | oval:org.mitre.oval:def:11188 | ||
Title: | Multiple off-by-one errors in FreeType2 before 2.3.6 allow context-dependent attackers to execute arbitrary code via (1) a crafted table in a Printer Font Binary (PFB) file or (2) a crafted SHC instruction in a TrueType Font (TTF) file, which triggers a heap-based buffer overflow. | ||
Description: | Multiple off-by-one errors in FreeType2 before 2.3.6 allow context-dependent attackers to execute arbitrary code via (1) a crafted table in a Printer Font Binary (PFB) file or (2) a crafted SHC instruction in a TrueType Font (TTF) file, which triggers a heap-based buffer overflow. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2008-1808 | Version: | 5 |
Platform(s): | Red Hat Enterprise Linux 3 CentOS Linux 3 Red Hat Enterprise Linux 4 CentOS Linux 4 Oracle Linux 4 Red Hat Enterprise Linux 5 CentOS Linux 5 Oracle Linux 5 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:11251 | |||
Oval ID: | oval:org.mitre.oval:def:11251 | ||
Title: | Multiple integer overflows in Cairo before 1.4.12 might allow remote attackers to execute arbitrary code, as demonstrated using a crafted PNG image with large width and height values, which is not properly handled by the read_png function. | ||
Description: | Multiple integer overflows in Cairo before 1.4.12 might allow remote attackers to execute arbitrary code, as demonstrated using a crafted PNG image with large width and height values, which is not properly handled by the read_png function. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2007-5503 | Version: | 5 |
Platform(s): | Red Hat Enterprise Linux 5 CentOS Linux 5 Oracle Linux 5 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:12117 | |||
Oval ID: | oval:org.mitre.oval:def:12117 | ||
Title: | HP-UX Running BIND, Remote DNS Cache Poisoning | ||
Description: | The DNS protocol, as implemented in (1) BIND 8 and 9 before 9.5.0-P1, 9.4.2-P1, and 9.3.5-P1; (2) Microsoft DNS in Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP1 and SP2; and other implementations allow remote attackers to spoof DNS traffic via a birthday attack that uses in-bailiwick referrals to conduct cache poisoning against recursive resolvers, related to insufficient randomness of DNS transaction IDs and source ports, aka "DNS Insufficient Socket Entropy Vulnerability" or "the Kaminsky bug." | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2008-1447 | Version: | 12 |
Platform(s): | HP-UX 11 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:13052 | |||
Oval ID: | oval:org.mitre.oval:def:13052 | ||
Title: | USN-730-1 -- libpng vulnerabilities | ||
Description: | It was discovered that libpng did not properly perform bounds checking in certain operations. An attacker could send a specially crafted PNG image and cause a denial of service in applications linked against libpng. This issue only affected Ubuntu 8.04 LTS. Tavis Ormandy discovered that libpng did not properly initialize memory. If a user or automated system were tricked into opening a crafted PNG image, an attacker could cause a denial of service via application crash, or possibly execute arbitrary code with the privileges of the user invoking the program. This issue did not affect Ubuntu 8.10. Harald van Dijk discovered an off-by-one error in libpng. An attacker could could cause an application crash in programs using pngtest. It was discovered that libpng did not properly NULL terminate a keyword string. An attacker could exploit this to set arbitrary memory locations to zero. Glenn Randers-Pehrson discovered that libpng did not properly initialize pointers. If a user or automated system were tricked into opening a crafted PNG file, an attacker could cause a denial of service or possibly execute arbitrary code with the privileges of the user invoking the program | ||
Family: | unix | Class: | patch |
Reference(s): | USN-730-1 CVE-2007-5268 CVE-2007-5269 CVE-2008-1382 CVE-2008-3964 CVE-2008-5907 CVE-2009-0040 | Version: | 5 |
Platform(s): | Ubuntu 7.10 Ubuntu 8.04 Ubuntu 6.06 Ubuntu 8.10 | Product(s): | libpng |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:13613 | |||
Oval ID: | oval:org.mitre.oval:def:13613 | ||
Title: | DSA-1750-1 libpng -- several | ||
Description: | Several vulnerabilities have been discovered in libpng, a library for reading and writing PNG files. The Common Vulnerabilities and Exposures project identifies the following problems: The png_handle_tRNS function allows attackers to cause a denial of service via a grayscale PNG image with a bad tRNS chunk CRC value. Certain chunk handlers allow attackers to cause a denial of service via crafted pCAL, sCAL, tEXt, iTXt, and ztXT chunking in PNG images, which trigger out-of-bounds read operations. libpng allows context-dependent attackers to cause a denial of service and possibly execute arbitrary code via a PNG file with zero length "unknown" chunks, which trigger an access of uninitialised memory. The png_check_keyword might allow context-dependent attackers to set the value of an arbitrary memory location to zero via vectors involving creation of crafted PNG files with keywords. A memory leak in the png_handle_tEXt function allows context-dependent attackers to cause a denial of service via a crafted PNG file. libpng allows context-dependent attackers to cause a denial of service or possibly execute arbitrary code via a crafted PNG file that triggers a free of an uninitialised pointer in the png_read_png function, pCAL chunk handling, or setup of 16-bit gamma tables. For the old stable distribution, these problems have been fixed in version1.2.15~beta5-1+etch2. For the stable distribution, these problems have been fixed in version 1.2.27-2+lenny2. For the unstable distribution, these problems have been fixed in version 1.2.35-1. We recommend that you upgrade your libpng packages. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-1750-1 CVE-2007-2445 CVE-2007-5269 CVE-2008-1382 CVE-2008-5907 CVE-2008-6218 CVE-2009-0040 | Version: | 5 |
Platform(s): | Debian GNU/Linux 5.0 Debian GNU/Linux 4.0 | Product(s): | libpng |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:16298 | |||
Oval ID: | oval:org.mitre.oval:def:16298 | ||
Title: | VMware View 3.1.3 addresses an important cross-site scripting vulnerability | ||
Description: | Cross-site scripting (XSS) vulnerability in VMware View (formerly Virtual Desktop Manager or VDM) 3.1.x before 3.1.3 build 252693 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2010-1143 | Version: | 4 |
Platform(s): | Microsoft Windows 7 Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows Vista Microsoft Windows XP | Product(s): | VMware View |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:16949 | |||
Oval ID: | oval:org.mitre.oval:def:16949 | ||
Title: | USN-550-1 -- libcairo vulnerability | ||
Description: | Peter Valchev discovered that Cairo did not correctly decode PNG image data. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-550-1 CVE-2007-5503 | Version: | 7 |
Platform(s): | Ubuntu 6.06 Ubuntu 6.10 Ubuntu 7.04 Ubuntu 7.10 | Product(s): | libcairo |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:17512 | |||
Oval ID: | oval:org.mitre.oval:def:17512 | ||
Title: | USN-627-1 -- dnsmasq vulnerability | ||
Description: | Dan Kaminsky discovered weaknesses in the DNS protocol as implemented by Dnsmasq. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-627-1 CVE-2008-1447 | Version: | 7 |
Platform(s): | Ubuntu 8.04 | Product(s): | dnsmasq |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:17563 | |||
Oval ID: | oval:org.mitre.oval:def:17563 | ||
Title: | USN-538-1 -- libpng vulnerabilities | ||
Description: | It was discovered that libpng did not properly perform bounds checking and comparisons in certain operations. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-538-1 CVE-2007-5268 CVE-2007-5269 | Version: | 7 |
Platform(s): | Ubuntu 6.06 Ubuntu 6.10 Ubuntu 7.04 Ubuntu 7.10 | Product(s): | libpng |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:17734 | |||
Oval ID: | oval:org.mitre.oval:def:17734 | ||
Title: | USN-622-1 -- bind9 vulnerability | ||
Description: | Dan Kaminsky discovered weaknesses in the DNS protocol as implemented by Bind. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-622-1 CVE-2008-1447 | Version: | 5 |
Platform(s): | Ubuntu 6.06 Ubuntu 7.04 Ubuntu 7.10 Ubuntu 8.04 | Product(s): | bind9 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:17811 | |||
Oval ID: | oval:org.mitre.oval:def:17811 | ||
Title: | USN-643-1 -- freetype vulnerabilities | ||
Description: | Multiple flaws were discovered in the PFB and TTF font handling code in freetype. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-643-1 CVE-2008-1806 CVE-2008-1807 CVE-2008-1808 | Version: | 7 |
Platform(s): | Ubuntu 6.06 Ubuntu 7.04 Ubuntu 7.10 Ubuntu 8.04 | Product(s): | freetype |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:18704 | |||
Oval ID: | oval:org.mitre.oval:def:18704 | ||
Title: | DSA-1623-1 dnsmasq - cache poisoning | ||
Description: | Dan Kaminsky discovered that properties inherent to the DNS protocol lead to practical DNS cache poisoning attacks. Among other things, successful attacks can lead to misdirected web traffic and email rerouting. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-1623-1 CVE-2008-1447 | Version: | 7 |
Platform(s): | Debian GNU/Linux 4.0 | Product(s): | dnsmasq |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:18724 | |||
Oval ID: | oval:org.mitre.oval:def:18724 | ||
Title: | DSA-1617-1 refpolicy - incompatible policy | ||
Description: | In DSA-1603-1, Debian released an update to the BIND 9 domain name server, which introduced UDP source port randomization to mitigate the threat of DNS cache poisoning attacks (identified by the Common Vulnerabilities and Exposures project as <a href="http://security-tracker.debian.org/tracker/CVE-2008-1447">CVE-2008-1447</a>). The fix, while correct, was incompatible with the version of SELinux Reference Policy shipped with Debian Etch, which did not permit a process running in the named_t domain to bind sockets to UDP ports other than the standard 'domain' port (53). The incompatibility affects both the 'targeted' and 'strict' policy packages supplied by this version of refpolicy. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-1617-1 CVE-2008-1447 | Version: | 7 |
Platform(s): | Debian GNU/Linux 4.0 | Product(s): | refpolicy |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:19448 | |||
Oval ID: | oval:org.mitre.oval:def:19448 | ||
Title: | DSA-1635-1 freetype - multiple vulnerabilities | ||
Description: | Several local vulnerabilities have been discovered in freetype, a FreeType 2 font engine, which could allow the execution of arbitrary code. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-1635-1 CVE-2008-1806 CVE-2008-1807 CVE-2008-1808 | Version: | 5 |
Platform(s): | Debian GNU/Linux 4.0 | Product(s): | freetype |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:19900 | |||
Oval ID: | oval:org.mitre.oval:def:19900 | ||
Title: | DSA-1603-1 bind9 - cache poisoning | ||
Description: | Dan Kaminsky discovered that properties inherent to the DNS protocol lead to practical DNS cache poisoning attacks. Among other things, successful attacks can lead to misdirected web traffic and email rerouting. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-1603-1 CVE-2008-1447 | Version: | 5 |
Platform(s): | Debian GNU/Linux 4.0 | Product(s): | bind9 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:20384 | |||
Oval ID: | oval:org.mitre.oval:def:20384 | ||
Title: | DSA-1542-1 libcairo - arbitrary code execution | ||
Description: | Peter Valchev (Google Security) discovered a series of integer overflow weaknesses in Cairo, a vector graphics rendering library used by many other applications. If an application uses cairo to render a maliciously crafted PNG image, the vulnerability allows the execution of arbitrary code. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-1542-1 CVE-2007-5503 | Version: | 5 |
Platform(s): | Debian GNU/Linux 4.0 | Product(s): | libcairo |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:21970 | |||
Oval ID: | oval:org.mitre.oval:def:21970 | ||
Title: | ELSA-2008:0533: bind security update (Important) | ||
Description: | The DNS protocol, as implemented in (1) BIND 8 and 9 before 9.5.0-P1, 9.4.2-P1, and 9.3.5-P1; (2) Microsoft DNS in Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP1 and SP2; and other implementations allow remote attackers to spoof DNS traffic via a birthday attack that uses in-bailiwick referrals to conduct cache poisoning against recursive resolvers, related to insufficient randomness of DNS transaction IDs and source ports, aka "DNS Insufficient Socket Entropy Vulnerability" or "the Kaminsky bug." | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2008:0533-02 CVE-2008-1447 | Version: | 6 |
Platform(s): | Oracle Linux 5 | Product(s): | bind selinux-policy-targeted selinux-policy |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:21991 | |||
Oval ID: | oval:org.mitre.oval:def:21991 | ||
Title: | ELSA-2007:1078: cairo security update (Important) | ||
Description: | Multiple integer overflows in Cairo before 1.4.12 might allow remote attackers to execute arbitrary code, as demonstrated using a crafted PNG image with large width and height values, which is not properly handled by the read_png function. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2007:1078-02 CVE-2007-5503 | Version: | 6 |
Platform(s): | Oracle Linux 5 | Product(s): | cairo |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:22177 | |||
Oval ID: | oval:org.mitre.oval:def:22177 | ||
Title: | ELSA-2008:0789: dnsmasq security update (Moderate) | ||
Description: | The DNS protocol, as implemented in (1) BIND 8 and 9 before 9.5.0-P1, 9.4.2-P1, and 9.3.5-P1; (2) Microsoft DNS in Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP1 and SP2; and other implementations allow remote attackers to spoof DNS traffic via a birthday attack that uses in-bailiwick referrals to conduct cache poisoning against recursive resolvers, related to insufficient randomness of DNS transaction IDs and source ports, aka "DNS Insufficient Socket Entropy Vulnerability" or "the Kaminsky bug." | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2008:0789-01 CVE-2008-1447 | Version: | 6 |
Platform(s): | Oracle Linux 5 | Product(s): | dnsmasq |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:22555 | |||
Oval ID: | oval:org.mitre.oval:def:22555 | ||
Title: | ELSA-2007:0992: libpng security update (Moderate) | ||
Description: | Certain chunk handlers in libpng before 1.0.29 and 1.2.x before 1.2.21 allow remote attackers to cause a denial of service (crash) via crafted (1) pCAL (png_handle_pCAL), (2) sCAL (png_handle_sCAL), (3) tEXt (png_push_read_tEXt), (4) iTXt (png_handle_iTXt), and (5) ztXT (png_handle_ztXt) chunking in PNG images, which trigger out-of-bounds read operations. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2007:0992-02 CVE-2007-5269 | Version: | 6 |
Platform(s): | Oracle Linux 5 | Product(s): | libpng libpng10 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:22715 | |||
Oval ID: | oval:org.mitre.oval:def:22715 | ||
Title: | ELSA-2008:0556: freetype security update (Important) | ||
Description: | Multiple off-by-one errors in FreeType2 before 2.3.6 allow context-dependent attackers to execute arbitrary code via (1) a crafted table in a Printer Font Binary (PFB) file or (2) a crafted SHC instruction in a TrueType Font (TTF) file, which triggers a heap-based buffer overflow. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2008:0556-02 CVE-2008-1806 CVE-2008-1807 CVE-2008-1808 | Version: | 17 |
Platform(s): | Oracle Linux 5 | Product(s): | freetype |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:22744 | |||
Oval ID: | oval:org.mitre.oval:def:22744 | ||
Title: | ELSA-2009:0333: libpng security update (Moderate) | ||
Description: | The PNG reference library (aka libpng) before 1.0.43, and 1.2.x before 1.2.35, as used in pngcrush and other applications, allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PNG file that triggers a free of an uninitialized pointer in (1) the png_read_png function, (2) pCAL chunk handling, or (3) setup of 16-bit gamma tables. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2009:0333-01 CVE-2008-1382 CVE-2009-0040 | Version: | 13 |
Platform(s): | Oracle Linux 5 | Product(s): | libpng libpng10 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:29167 | |||
Oval ID: | oval:org.mitre.oval:def:29167 | ||
Title: | RHSA-2008:0789 -- dnsmasq security update (Moderate) | ||
Description: | An updated dnsmasq package that implements UDP source-port randomization is now available for Red Hat Enterprise Linux 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. Dnsmasq is lightweight DNS forwarder and DHCP server. It is designed to provide DNS and, optionally, DHCP, to a small network. The dnsmasq DNS resolver used a fixed source UDP port. This could have made DNS spoofing attacks easier. dnsmasq has been updated to use random UDP source ports, helping to make DNS spoofing attacks harder. (CVE-2008-1447) All dnsmasq users are advised to upgrade to this updated package, that upgrades dnsmasq to version 2.45, which resolves this issue. | ||
Family: | unix | Class: | patch |
Reference(s): | RHSA-2008:0789 CVE-2008-1447 | Version: | 3 |
Platform(s): | Red Hat Enterprise Linux 5 | Product(s): | dnsmasq |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:29196 | |||
Oval ID: | oval:org.mitre.oval:def:29196 | ||
Title: | RHSA-2009:0333 -- libpng security update (Moderate) | ||
Description: | Updated libpng and libpng10 packages that fix a couple of security issues are now available for Red Hat Enterprise Linux 2.1, 4, and 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. The libpng packages contain a library of functions for creating and manipulating PNG (Portable Network Graphics) image format files. A flaw was discovered in libpng that could result in libpng trying to freerandom memory if certain, unlikely error conditions occurred. If a carefully-crafted PNG file was loaded by an application linked against libpng, it could cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application. (CVE-2009-0040) | ||
Family: | unix | Class: | patch |
Reference(s): | RHSA-2009:0333 CESA-2009:0333-CentOS 2 CVE-2008-1382 CVE-2009-0040 | Version: | 3 |
Platform(s): | Red Hat Enterprise Linux 5 Red Hat Enterprise Linux 4 CentOS Linux 2 | Product(s): | libpng libpng10 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:4768 | |||
Oval ID: | oval:org.mitre.oval:def:4768 | ||
Title: | VMware Unsafe Library Path in vmware-authd Lets Local Users Gain Elevated Privileges | ||
Description: | Untrusted search path vulnerability in vmware-authd in VMware Workstation 5.x before 5.5.7 build 91707 and 6.x before 6.0.4 build 93057, VMware Player 1.x before 1.0.7 build 91707 and 2.x before 2.0.4 build 93057, and VMware Server before 1.0.6 build 91891 on Linux, and VMware ESXi 3.5 and VMware ESX 2.5.4 through 3.5, allows local users to gain privileges via a library path option in a configuration file. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2008-0967 | Version: | 3 |
Platform(s): | VMWare ESX Server 3 VMWare ESX Server 2 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:5081 | |||
Oval ID: | oval:org.mitre.oval:def:5081 | ||
Title: | VMware Buffer Overflows in VIX API Let Local Users Execute Arbitrary Code | ||
Description: | Multiple buffer overflows in VIX API 1.1.x before 1.1.4 build 93057 on VMware Workstation 5.x and 6.x, VMware Player 1.x and 2.x, VMware ACE 2.x, VMware Server 1.x, VMware Fusion 1.x, VMware ESXi 3.5, and VMware ESX 3.0.1 through 3.5 allow guest OS users to execute arbitrary code on the host OS via unspecified vectors. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2008-2100 | Version: | 3 |
Platform(s): | VMWare ESX Server 3 VMWare ESX Server 2 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:5358 | |||
Oval ID: | oval:org.mitre.oval:def:5358 | ||
Title: | VMware Tools Input Validation Flaw in Windows Guest OS Lets Local Users Gain Elevated Privileges | ||
Description: | HGFS.sys in the VMware Tools package in VMware Workstation 5.x before 5.5.6 build 80404, VMware Player before 1.0.6 build 80404, VMware ACE before 1.0.5 build 79846, VMware Server before 1.0.5 build 80187, and VMware ESX 2.5.4 through 3.0.2 does not properly validate arguments in user-mode METHOD_NEITHER IOCTLs to the \\.\hgfs device, which allows guest OS users to modify arbitrary memory locations in guest kernel memory and gain privileges. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2007-5671 | Version: | 3 |
Platform(s): | VMWare ESX Server 3 VMWare ESX Server 2 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:5583 | |||
Oval ID: | oval:org.mitre.oval:def:5583 | ||
Title: | VMware Unsafe Library Path in vmware-authd Lets Local Users Gain Elevated Privileges | ||
Description: | Untrusted search path vulnerability in vmware-authd in VMware Workstation 5.x before 5.5.7 build 91707 and 6.x before 6.0.4 build 93057, VMware Player 1.x before 1.0.7 build 91707 and 2.x before 2.0.4 build 93057, and VMware Server before 1.0.6 build 91891 on Linux, and VMware ESXi 3.5 and VMware ESX 2.5.4 through 3.5, allows local users to gain privileges via a library path option in a configuration file. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2008-0967 | Version: | 3 |
Platform(s): | VMWare ESX Server 3 VMWare ESX Server 2 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:5647 | |||
Oval ID: | oval:org.mitre.oval:def:5647 | ||
Title: | VMware Buffer Overflows in VIX API Let Local Users Execute Arbitrary Code | ||
Description: | Multiple buffer overflows in VIX API 1.1.x before 1.1.4 build 93057 on VMware Workstation 5.x and 6.x, VMware Player 1.x and 2.x, VMware ACE 2.x, VMware Server 1.x, VMware Fusion 1.x, VMware ESXi 3.5, and VMware ESX 3.0.1 through 3.5 allow guest OS users to execute arbitrary code on the host OS via unspecified vectors. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2008-2100 | Version: | 3 |
Platform(s): | VMWare ESX Server 3 VMWare ESX Server 2 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:5688 | |||
Oval ID: | oval:org.mitre.oval:def:5688 | ||
Title: | VMware Tools Input Validation Flaw in Windows Guest OS Lets Local Users Gain Elevated Privileges | ||
Description: | HGFS.sys in the VMware Tools package in VMware Workstation 5.x before 5.5.6 build 80404, VMware Player before 1.0.6 build 80404, VMware ACE before 1.0.5 build 79846, VMware Server before 1.0.5 build 80187, and VMware ESX 2.5.4 through 3.0.2 does not properly validate arguments in user-mode METHOD_NEITHER IOCTLs to the \\.\hgfs device, which allows guest OS users to modify arbitrary memory locations in guest kernel memory and gain privileges. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2007-5671 | Version: | 3 |
Platform(s): | VMWare ESX Server 3 VMWare ESX Server 2 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:5725 | |||
Oval ID: | oval:org.mitre.oval:def:5725 | ||
Title: | DNS Insufficient Socket Entropy Vulnerability | ||
Description: | The DNS protocol, as implemented in (1) BIND 8 and 9 before 9.5.0-P1, 9.4.2-P1, and 9.3.5-P1; (2) Microsoft DNS in Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP1 and SP2; and other implementations allow remote attackers to spoof DNS traffic via a birthday attack that uses in-bailiwick referrals to conduct cache poisoning against recursive resolvers, related to insufficient randomness of DNS transaction IDs and source ports, aka "DNS Insufficient Socket Entropy Vulnerability" or "the Kaminsky bug." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2008-1447 | Version: | 3 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Server 2003 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:5761 | |||
Oval ID: | oval:org.mitre.oval:def:5761 | ||
Title: | HP-UX Running BIND, Remote DNS Cache Poisoning | ||
Description: | The DNS protocol, as implemented in (1) BIND 8 and 9 before 9.5.0-P1, 9.4.2-P1, and 9.3.5-P1; (2) Microsoft DNS in Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP1 and SP2; and other implementations allow remote attackers to spoof DNS traffic via a birthday attack that uses in-bailiwick referrals to conduct cache poisoning against recursive resolvers, related to insufficient randomness of DNS transaction IDs and source ports, aka "DNS Insufficient Socket Entropy Vulnerability" or "the Kaminsky bug." | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2008-1447 | Version: | 9 |
Platform(s): | HP-UX 11 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:5786 | |||
Oval ID: | oval:org.mitre.oval:def:5786 | ||
Title: | VMWare Guest Virtual Device Driver Vulnerability | ||
Description: | Heap-based buffer overflow in the VNnc Codec in VMware Workstation 6.5.x before 6.5.2 build 156735, VMware Player 2.5.x before 2.5.2 build 156735, VMware ACE 2.5.x before 2.5.2 build 156735, and VMware Server 2.0.x before 2.0.1 build 156745 allows remote attackers to execute arbitrary code via a crafted web page or video file, aka ZDI-CAN-436. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2009-0910 | Version: | 2 |
Platform(s): | VMWare ESX Server 3 VMWare ESX Server 3.5 | Product(s): | |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:5917 | |||
Oval ID: | oval:org.mitre.oval:def:5917 | ||
Title: | Security Vulnerability in the DNS Protocol May Lead to DNS Cache Poisoning | ||
Description: | The DNS protocol, as implemented in (1) BIND 8 and 9 before 9.5.0-P1, 9.4.2-P1, and 9.3.5-P1; (2) Microsoft DNS in Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP1 and SP2; and other implementations allow remote attackers to spoof DNS traffic via a birthday attack that uses in-bailiwick referrals to conduct cache poisoning against recursive resolvers, related to insufficient randomness of DNS transaction IDs and source ports, aka "DNS Insufficient Socket Entropy Vulnerability" or "the Kaminsky bug." | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2008-1447 | Version: | 1 |
Platform(s): | Sun Solaris 8 Sun Solaris 9 Sun Solaris 10 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:6065 | |||
Oval ID: | oval:org.mitre.oval:def:6065 | ||
Title: | VMware Multiple Hosted Products Display Function Code Execution Vulnerability | ||
Description: | Unspecified vulnerability in the virtual machine display function in VMware Workstation 6.5.1 and earlier; VMware Player 2.5.1 and earlier; VMware ACE 2.5.1 and earlier; VMware Server 1.x before 1.0.9 build 156507 and 2.x before 2.0.1 build 156745; VMware Fusion before 2.0.4 build 159196; VMware ESXi 3.5; and VMware ESX 3.0.2, 3.0.3, and 3.5 allows guest OS users to execute arbitrary code on the host OS via unknown vectors, a different vulnerability than CVE-2008-4916. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2009-1244 | Version: | 1 |
Platform(s): | VMWare ESX Server 3 VMWare ESX Server 3.5 | Product(s): | |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:6246 | |||
Oval ID: | oval:org.mitre.oval:def:6246 | ||
Title: | VMware ESX Virtual Hardware Memory Access Bug Lets Local Users Gain Elevated Privileges | ||
Description: | Unspecified vulnerability in VMware Workstation 5.5.8 and earlier, and 6.0.5 and earlier 6.x versions; VMware Player 1.0.8 and earlier, and 2.0.5 and earlier 2.x versions; VMware Server 1.0.9 and earlier; VMware ESXi 3.5; and VMware ESX 3.0.2 through 3.5 allows guest OS users to have an unknown impact by sending the virtual hardware a request that triggers an arbitrary physical-memory write operation, leading to memory corruption. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2008-4917 | Version: | 3 |
Platform(s): | VMWare ESX Server 3 VMWare ESX Server 3.5 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:6251 | |||
Oval ID: | oval:org.mitre.oval:def:6251 | ||
Title: | VMware Heap Overflows in VNnc Codec Lets Remote Users Execute Arbitrary Code | ||
Description: | Heap-based buffer overflow in the VNnc Codec in VMware Workstation 6.5.x before 6.5.2 build 156735, VMware Player 2.5.x before 2.5.2 build 156735, VMware ACE 2.5.x before 2.5.2 build 156735, and VMware Server 2.0.x before 2.0.1 build 156745 allows remote attackers to execute arbitrary code via a crafted web page or video file, aka ZDI-CAN-435. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2009-0909 | Version: | 2 |
Platform(s): | VMWare ESX Server 3 VMWare ESX Server 3.5 | Product(s): | |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:6309 | |||
Oval ID: | oval:org.mitre.oval:def:6309 | ||
Title: | VMware CPU Hardware Emulation Bug Lets Local Users Gain Elevated Privileges | ||
Description: | The CPU hardware emulation in VMware Workstation 6.0.5 and earlier and 5.5.8 and earlier; Player 2.0.x through 2.0.5 and 1.0.x through 1.0.8; ACE 2.0.x through 2.0.5 and earlier, and 1.0.x through 1.0.7; Server 1.0.x through 1.0.7; ESX 2.5.4 through 3.5; and ESXi 3.5, when running 32-bit and 64-bit guest operating systems, does not properly handle the Trap flag, which allows authenticated guest OS users to gain privileges on the guest OS. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2008-4915 | Version: | 3 |
Platform(s): | VMWare ESX Server 3 VMWare ESX Server 3.5 | Product(s): | |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:6439 | |||
Oval ID: | oval:org.mitre.oval:def:6439 | ||
Title: | VMware Guest Virtual Device Driver Bug Lets Local Users Deny Service | ||
Description: | Unspecified vulnerability in a guest virtual device driver in VMware Workstation before 5.5.9 build 126128, and 6.5.1 and earlier 6.x versions; VMware Player before 1.0.9 build 126128, and 2.5.1 and earlier 2.x versions; VMware ACE before 1.0.8 build 125922, and 2.5.1 and earlier 2.x versions; VMware Server 1.x before 1.0.8 build 126538 and 2.0.x before 2.0.1 build 156745; VMware Fusion before 2.0.1; VMware ESXi 3.5; and VMware ESX 3.0.2, 3.0.3, and 3.5 allows guest OS users to cause a denial of service (host OS crash) via unknown vectors. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2008-4916 | Version: | 1 |
Platform(s): | VMWare ESX Server 3 VMWare ESX Server 3.5 | Product(s): | |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:6458 | |||
Oval ID: | oval:org.mitre.oval:def:6458 | ||
Title: | Libpng Library Uninitialized Pointer Arrays Memory Corruption Vulnerability | ||
Description: | The PNG reference library (aka libpng) before 1.0.43, and 1.2.x before 1.2.35, as used in pngcrush and other applications, allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PNG file that triggers a free of an uninitialized pointer in (1) the png_read_png function, (2) pCAL chunk handling, or (3) setup of 16-bit gamma tables. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2009-0040 | Version: | 1 |
Platform(s): | VMWare ESX Server 3 VMWare ESX Server 3.5 | Product(s): | |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:6557 | |||
Oval ID: | oval:org.mitre.oval:def:6557 | ||
Title: | DSA-1750 libpng -- several vulnerabilities | ||
Description: | Several vulnerabilities have been discovered in libpng, a library for reading and writing PNG files. The Common Vulnerabilities and Exposures project identifies the following problems: The png_handle_tRNS function allows attackers to cause a denial of service (application crash) via a grayscale PNG image with a bad tRNS chunk CRC value. Certain chunk handlers allow attackers to cause a denial of service (crash) via crafted pCAL, sCAL, tEXt, iTXt, and ztXT chunking in PNG images, which trigger out-of-bounds read operations. libpng allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a PNG file with zero length "unknown" chunks, which trigger an access of uninitialised memory. The png_check_keyword might allow context-dependent attackers to set the value of an arbitrary memory location to zero via vectors involving creation of crafted PNG files with keywords. A memory leak in the png_handle_tEXt function allows context-dependent attackers to cause a denial of service (memory exhaustion) via a crafted PNG file. libpng allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PNG file that triggers a free of an uninitialised pointer in (1) the png_read_png function, (2) pCAL chunk handling, or (3) setup of 16-bit gamma tables. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-1750 CVE-2007-2445 CVE-2007-5269 CVE-2008-1382 CVE-2008-5907 CVE-2008-6218 CVE-2009-0040 | Version: | 3 |
Platform(s): | Debian GNU/Linux 5.0 Debian GNU/Linux 4.0 | Product(s): | libpng |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:6863 | |||
Oval ID: | oval:org.mitre.oval:def:6863 | ||
Title: | WebAccess Virtual Machine Name Cross-site Scripting Vulnerability | ||
Description: | Cross-site scripting (XSS) vulnerability in WebAccess in VMware VirtualCenter 2.0.2 and 2.5 and VMware ESX 3.0.3 and 3.5, and the Server Console in VMware Server 1.0, allows remote attackers to inject arbitrary web script or HTML via the name of a virtual machine. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2010-1137 | Version: | 3 |
Platform(s): | VMWare ESX Server 3.5 | Product(s): | |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:7020 | |||
Oval ID: | oval:org.mitre.oval:def:7020 | ||
Title: | Windows-based VMware Tools Unsafe Library Loading vulnerability | ||
Description: | VMware Tools in VMware Workstation 6.5.x before 6.5.4 build 246459; VMware Player 2.5.x before 2.5.4 build 246459; VMware ACE 2.5.x before 2.5.4 build 246459; VMware Server 2.x before 2.0.2 build 203138; VMware Fusion 2.x before 2.0.6 build 246742; VMware ESXi 3.5 and 4.0; and VMware ESX 2.5.5, 3.0.3, 3.5, and 4.0 does not properly access libraries, which allows user-assisted remote attackers to execute arbitrary code by tricking a Windows guest OS user into clicking on a file that is stored on a network share. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2010-1141 | Version: | 5 |
Platform(s): | VMWare ESX Server 3 VMWare ESX Server 3.5 VMWare ESX Server 4.0 | Product(s): | |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:7383 | |||
Oval ID: | oval:org.mitre.oval:def:7383 | ||
Title: | DSA-1635 freetype -- multiple vulnerabilities | ||
Description: | Several local vulnerabilities have been discovered in freetype, a FreeType 2 font engine, which could allow the execution of arbitrary code. The Common Vulnerabilities and Exposures project identifies the following problems: An integer overflow allows context-dependent attackers to execute arbitrary code via a crafted set of values within the Private dictionary table in a Printer Font Binary (PFB) file. The handling of an invalid number of axes field in the PFB file could trigger the freeing of arbitrary memory locations, leading to memory corruption. Multiple off-by-one errors allowed the execution of arbitrary code via malformed tables in PFB files, or invalid SHC instructions in TTF files. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-1635 CVE-2008-1806 CVE-2008-1807 CVE-2008-1808 | Version: | 3 |
Platform(s): | Debian GNU/Linux 4.0 | Product(s): | freetype |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:7531 | |||
Oval ID: | oval:org.mitre.oval:def:7531 | ||
Title: | DSA-1623 dnsmasq -- DNS cache poisoning | ||
Description: | Dan Kaminsky discovered that properties inherent to the DNS protocol lead to practical DNS cache poisoning attacks. Among other things, successful attacks can lead to misdirected web traffic and email rerouting. This update changes Debian's dnsmasq packages to implement the recommended countermeasure: UDP query source port randomization. This change increases the size of the space from which an attacker has to guess values in a backwards-compatible fashion and makes successful attacks significantly more difficult. This update also switches the random number generator to Dan Bernstein's SURF. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-1623 CVE-2008-1447 | Version: | 3 |
Platform(s): | Debian GNU/Linux 4.0 | Product(s): | dnsmasq |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:7660 | |||
Oval ID: | oval:org.mitre.oval:def:7660 | ||
Title: | DSA-1617 refpolicy -- incompatible policy | ||
Description: | In DSA-1603-1, Debian released an update to the BIND 9 domain name server, which introduced UDP source port randomization to mitigate the threat of DNS cache poisoning attacks (identified by the Common Vulnerabilities and Exposures project as CVE-2008-1447). The fix, while correct, was incompatible with the version of SELinux Reference Policy shipped with Debian Etch, which did not permit a process running in the named_t domain to bind sockets to UDP ports other than the standard "domain" port (53). The incompatibility affects both the "targeted" and "strict" policy packages supplied by this version of refpolicy. This update to the refpolicy packages grants the ability to bind to arbitrary UDP ports to named_t processes. When installed, the updated packages will attempt to update the bind policy module on systems where it had been previously loaded and where the previous version of refpolicy was 0.0.20061018-5 or below. Because the Debian refpolicy packages are not yet designed with policy module upgradeability in mind, and because SELinux-enabled Debian systems often have some degree of site-specific policy customization, it is difficult to assure that the new bind policy can be successfully upgraded. To this end, the package upgrade will not abort if the bind policy update fails. The new policy module can be found at /usr/share/selinux/refpolicy-targeted/bind.pp after installation. Administrators wishing to use the bind service policy can reconcile any policy incompatibilities and install the upgrade manually thereafter. A more detailed discussion of the corrective procedure may be found on http://wiki.debian.org/SELinux/Issues/BindPortRandomization. For the stable distribution (etch), this problem has been fixed in version 0.0.20061018-5.1+etch1. The unstable distribution (sid) is not affected, as subsequent refpolicy releases have incorporated an analogous change. We recommend that you upgrade your refpolicy packages. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-1617 CVE-2008-1447 | Version: | 3 |
Platform(s): | Debian GNU/Linux 4.0 | Product(s): | refpolicy |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:7822 | |||
Oval ID: | oval:org.mitre.oval:def:7822 | ||
Title: | VMware directory traversal vulnerability | ||
Description: | Directory traversal vulnerability in VMware Server 1.x before 1.0.10 build 203137 and 2.x before 2.0.2 build 203138 on Linux, VMware ESXi 3.5, and VMware ESX 3.0.3 and 3.5 allows remote attackers to read arbitrary files via unspecified vectors. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2009-3733 | Version: | 2 |
Platform(s): | VMWare ESX Server 3 VMWare ESX Server 3.5 | Product(s): | |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:8092 | |||
Oval ID: | oval:org.mitre.oval:def:8092 | ||
Title: | DSA-1603 bind9 -- DNS cache poisoning | ||
Description: | Dan Kaminsky discovered that properties inherent to the DNS protocol lead to practical DNS cache poisoning attacks. Among other things, successful attacks can lead to misdirected web traffic and email rerouting. This update changes Debian's BIND 9 packages to implement the recommended countermeasure: UDP query source port randomization. This change increases the size of the space from which an attacker has to guess values in a backwards-compatible fashion and makes successful attacks significantly more difficult. Note that this security update changes BIND network behavior in a fundamental way, and the following steps are recommended to ensure a smooth upgrade. 1. Make sure that your network configuration is compatible with source port randomization. If you guard your resolver with a stateless packet filter, you may need to make sure that no non-DNS services listen on the 1024--65535 UDP port range and open it at the packet filter. For instance, packet filters based on etch's Linux 2.6.18 kernel only support stateless filtering of IPv6 packets, and therefore pose this additional difficulty. (If you use IPv4 with iptables and ESTABLISHED rules, networking changes are likely not required.) 2. Install the BIND 9 upgrade, using "apt-get update" followed by "apt-get install bind9". Verify that the named process has been restarted and answers recursive queries. (If all queries result in timeouts, this indicates that networking changes are necessary; see the first step.) 3. Verify that source port randomization is active. Check that the /var/log/daemon.log file does not contain messages of the following form right after the "listening on IPv6 interface" and "listening on IPv4 interface" messages logged by BIND upon startup. If these messages are present, you should remove the indicated lines from the configuration, or replace the port numbers contained within them with "*" sign (e.g., replace "port 53" with "port *"). For additional certainty, use tcpdump or some other network monitoring tool to check for varying UDP source ports. If there is a NAT device in front of your resolver, make sure that it does not defeat the effect of source port randomization. 4. If you cannot activate source port randomization, consider configuring BIND 9 to forward queries to a resolver which can, possibly over a VPN such as OpenVPN to create the necessary trusted network link. (Use BIND's forward-only mode in this case.) Other caching resolvers distributed by Debian (PowerDNS, MaraDNS, Unbound) already employ source port randomization, and no updated packages are needed. BIND 9.5 up to and including version 1:9.5.0.dfsg-4 only implements a weak form of source port randomization and needs to be updated as well. For information on BIND 8, see DSA-1604-1, and for the status of the libc stub resolver, see DSA-1605-1. The updated bind9 packages contain changes originally scheduled for the next stable point release, including the changed IP address of L.ROOT-SERVERS.NET (Debian bug #449148). | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-1603 CVE-2008-1447 | Version: | 5 |
Platform(s): | Debian GNU/Linux 4.0 | Product(s): | bind9 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:8136 | |||
Oval ID: | oval:org.mitre.oval:def:8136 | ||
Title: | DSA-1542 libcairo -- integer overflow | ||
Description: | Peter Valchev (Google Security) discovered a series of integer overflow weaknesses in Cairo, a vector graphics rendering library used by many other applications. If an application uses cairo to render a maliciously crafted PNG image, the vulnerability allows the execution of arbitrary code. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-1542 CVE-2007-5503 | Version: | 3 |
Platform(s): | Debian GNU/Linux 4.0 | Product(s): | libcairo |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:8473 | |||
Oval ID: | oval:org.mitre.oval:def:8473 | ||
Title: | VMware improper setting of the exception code on page faults vulnerability | ||
Description: | VMware Workstation 6.5.x before 6.5.3 build 185404, VMware Player 2.5.x before 2.5.3 build 185404, VMware ACE 2.5.x before 2.5.3 build 185404, VMware Server 1.x before 1.0.10 build 203137 and 2.x before 2.0.2 build 203138, VMware Fusion 2.x before 2.0.6 build 196839, VMware ESXi 3.5 and 4.0, and VMware ESX 2.5.5, 3.0.3, 3.5, and 4.0, when Virtual-8086 mode is used, do not properly set the exception code upon a page fault (aka #PF) exception, which allows guest OS users to gain privileges on the guest OS by specifying a crafted value for the cs register. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2009-2267 | Version: | 4 |
Platform(s): | VMWare ESX Server 3 VMWare ESX Server 3.5 VMWare ESX Server 4.0 | Product(s): | |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:9321 | |||
Oval ID: | oval:org.mitre.oval:def:9321 | ||
Title: | Integer overflow in FreeType2 before 2.3.6 allows context-dependent attackers to execute arbitrary code via a crafted set of 16-bit length values within the Private dictionary table in a Printer Font Binary (PFB) file, which triggers a heap-based buffer overflow. | ||
Description: | Integer overflow in FreeType2 before 2.3.6 allows context-dependent attackers to execute arbitrary code via a crafted set of 16-bit length values within the Private dictionary table in a Printer Font Binary (PFB) file, which triggers a heap-based buffer overflow. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2008-1806 | Version: | 5 |
Platform(s): | Red Hat Enterprise Linux 3 CentOS Linux 3 Red Hat Enterprise Linux 4 CentOS Linux 4 Oracle Linux 4 Red Hat Enterprise Linux 5 CentOS Linux 5 Oracle Linux 5 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:9627 | |||
Oval ID: | oval:org.mitre.oval:def:9627 | ||
Title: | The DNS protocol, as implemented in (1) BIND 8 and 9 before 9.5.0-P1, 9.4.2-P1, and 9.3.5-P1; (2) Microsoft DNS in Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP1 and SP2; and other implementations allow remote attackers to spoof DNS traffic via a birthday attack that uses in-bailiwick referrals to conduct cache poisoning against recursive resolvers, related to insufficient randomness of DNS transaction IDs and source ports, aka "DNS Insufficient Socket Entropy Vulnerability" or "the Kaminsky bug." | ||
Description: | The DNS protocol, as implemented in (1) BIND 8 and 9 before 9.5.0-P1, 9.4.2-P1, and 9.3.5-P1; (2) Microsoft DNS in Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP1 and SP2; and other implementations allow remote attackers to spoof DNS traffic via a birthday attack that uses in-bailiwick referrals to conduct cache poisoning against recursive resolvers, related to insufficient randomness of DNS transaction IDs and source ports, aka "DNS Insufficient Socket Entropy Vulnerability" or "the Kaminsky bug." | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2008-1447 | Version: | 5 |
Platform(s): | Red Hat Enterprise Linux 3 CentOS Linux 3 Red Hat Enterprise Linux 4 CentOS Linux 4 Oracle Linux 4 Red Hat Enterprise Linux 5 CentOS Linux 5 Oracle Linux 5 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:9767 | |||
Oval ID: | oval:org.mitre.oval:def:9767 | ||
Title: | FreeType2 before 2.3.6 allow context-dependent attackers to execute arbitrary code via an invalid "number of axes" field in a Printer Font Binary (PFB) file, which triggers a free of arbitrary memory locations, leading to memory corruption. | ||
Description: | FreeType2 before 2.3.6 allow context-dependent attackers to execute arbitrary code via an invalid "number of axes" field in a Printer Font Binary (PFB) file, which triggers a free of arbitrary memory locations, leading to memory corruption. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2008-1807 | Version: | 5 |
Platform(s): | Red Hat Enterprise Linux 3 CentOS Linux 3 Red Hat Enterprise Linux 4 CentOS Linux 4 Oracle Linux 4 Red Hat Enterprise Linux 5 CentOS Linux 5 Oracle Linux 5 | Product(s): | |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
ExploitDB Exploits
id | Description |
---|---|
2009-10-27 | VMware Server <= 2.0.1,ESXi Server <= 3.5 Directory Traversal Vulnerabi... |
2010-05-14 | VMware View Portal <= 3.1 XSS vulnerability |
2010-04-12 | VMware Remote Console e.x.p build-158248 - format string vulnerability |
2008-07-25 | BIND 9.x Remote DNS Cache Poisoning Flaw Exploit (c) |
2008-07-24 | BIND 9.x Remote DNS Cache Poisoning Flaw Exploit (py) |
2008-07-23 | BIND 9.4.1-9.4.2 Remote DNS Cache Poisoning Flaw Exploit (meta) |
OpenVAS Exploits
Date | Description |
---|---|
2012-10-03 | Name : Gentoo Security Advisory GLSA 201209-25 (vmware-server vmware-player vmware-w... File : nvt/glsa_201209_25.nasl |
2012-04-16 | Name : VMSA-2010-0007: VMware hosted products, vCenter Server and ESX patches resolv... File : nvt/gb_VMSA-2010-0007.nasl |
2011-11-17 | Name : VMware Fusion UDF File Systems Buffer Overflow Vulnerability (Mac OS X) File : nvt/secpod_vmware_fusion_udf_filesys_bof_vuln_macosx.nasl |
2011-11-17 | Name : VMware Products UDF File Systems Buffer Overflow Vulnerability (Linux) File : nvt/secpod_vmware_prdts_udf_filesys_bof_vuln_lin.nasl |
2011-11-17 | Name : VMware Products UDF File Systems Buffer Overflow Vulnerability (Win) File : nvt/secpod_vmware_prdts_udf_filesys_bof_vuln_win.nasl |
2011-08-09 | Name : CentOS Update for firefox CESA-2009:0315 centos4 i386 File : nvt/gb_CESA-2009_0315_firefox_centos4_i386.nasl |
2011-08-09 | Name : CentOS Update for firefox CESA-2009:0315 centos5 i386 File : nvt/gb_CESA-2009_0315_firefox_centos5_i386.nasl |
2011-08-09 | Name : CentOS Update for seamonkey CESA-2009:0325-01 centos2 i386 File : nvt/gb_CESA-2009_0325-01_seamonkey_centos2_i386.nasl |
2011-08-09 | Name : CentOS Update for seamonkey CESA-2009:0325 centos3 i386 File : nvt/gb_CESA-2009_0325_seamonkey_centos3_i386.nasl |
2011-08-09 | Name : CentOS Update for seamonkey CESA-2009:0325 centos4 i386 File : nvt/gb_CESA-2009_0325_seamonkey_centos4_i386.nasl |
2011-08-09 | Name : CentOS Update for freetype CESA-2009:0329 centos3 i386 File : nvt/gb_CESA-2009_0329_freetype_centos3_i386.nasl |
2011-08-09 | Name : CentOS Update for libpng CESA-2009:0333-01 centos2 i386 File : nvt/gb_CESA-2009_0333-01_libpng_centos2_i386.nasl |
2011-08-09 | Name : CentOS Update for libpng10 CESA-2009:0333 centos4 i386 File : nvt/gb_CESA-2009_0333_libpng10_centos4_i386.nasl |
2011-08-09 | Name : CentOS Update for libpng10 CESA-2009:0340 centos3 i386 File : nvt/gb_CESA-2009_0340_libpng10_centos3_i386.nasl |
2010-05-12 | Name : Mac OS X Security Update 2008-005 File : nvt/macosx_secupd_2008-005.nasl |
2010-05-12 | Name : Mac OS X Security Update 2009-001 File : nvt/macosx_secupd_2009-001.nasl |
2010-05-12 | Name : Mac OS X 10.5.3 Update / Mac OS X Security Update 2008-003 File : nvt/macosx_upd_10_5_3_secupd_2008-003.nasl |
2010-05-12 | Name : Mac OS X 10.5.5 Update / Security Update 2008-006 File : nvt/macosx_upd_10_5_5_secupd_2008-006.nasl |
2010-05-12 | Name : Mac OS X 10.5.7 Update / Mac OS X Security Update 2009-002 File : nvt/macosx_upd_10_5_7_secupd_2009-002.nasl |
2010-05-12 | Name : Mac OS X 10.5.8 Update / Mac OS X Security Update 2009-003 File : nvt/macosx_upd_10_5_8_secupd_2009-003.nasl |
2010-04-29 | Name : VMware Authorization Service Denial of Service Vulnerability (Win) -Apr10 File : nvt/secpod_vmware_prdts_dos_vuln_win_apr10.nasl |
2010-04-16 | Name : VMware Products Multiple Vulnerabilities (Windows) File : nvt/gb_vmware_prdts_mult_vuln_win01.nasl |
2010-04-16 | Name : VMware Products Tools Remote Code Execution Vulnerabilies (win) File : nvt/gb_vmware_prdts_tools_code_exec_vuln_lin.nasl |
2010-04-16 | Name : VMware Products Tools Remote Code Execution Vulnerabilies (win) File : nvt/gb_vmware_prdts_tools_code_exec_vuln_win.nasl |
2010-04-16 | Name : VMware Products USB Service Local Privilege Escalation Vulnerability (Win) File : nvt/gb_vmware_prdts_usb_service_local_prv_esc_vuln_win.nasl |
2010-04-16 | Name : VMware Products 'vmware-vmx' Information Disclosure Vulnerability (Linux) File : nvt/gb_vmware_prdts_vmx_info_disc_vuln_lin.nasl |
2010-04-16 | Name : VMware Products 'vmware-vmx' Information Disclosure Vulnerability (Win) File : nvt/gb_vmware_prdts_vmx_info_disc_vuln_win.nasl |
2010-04-13 | Name : VMware WebAccess Cross Site Scripting vulnerability (Linux) File : nvt/gb_vmware_server_webaccess_xss_vuln_lin.nasl |
2010-04-13 | Name : VMware WebAccess Cross Site Scripting vulnerability (Win) File : nvt/gb_vmware_server_webaccess_xss_vuln_win.nasl |
2010-02-23 | Name : VMware Products Directory Traversal Vulnerability File : nvt/vmware_36842_remote.nasl |
2009-11-17 | Name : Mac OS X Version File : nvt/macosx_version.nasl |
2009-11-05 | Name : VMware Products Guest Privilege Escalation Vulnerability - Nov09 (Linux) File : nvt/gb_vmware_prdts_priv_esc_vuln_nov09_lin.nasl |
2009-11-05 | Name : VMware Products Guest Privilege Escalation Vulnerability - Nov09 (Win) File : nvt/gb_vmware_prdts_priv_esc_vuln_nov09_win.nasl |
2009-11-05 | Name : VMware Serve Directory Traversal Vulnerability - Nov09 (Linux) File : nvt/gb_vmware_serv_dir_trav_vuln_nov09_lin.nasl |
2009-10-22 | Name : VMware Authorization Service Denial of Service Vulnerability (Win) File : nvt/gb_vmware_authorization_service_dos_vuln_win.nasl |
2009-10-13 | Name : SLES10: Security update for MozillaFirefox File : nvt/sles10_MozillaFirefox3.nasl |
2009-10-13 | Name : SLES10: Security update for bind File : nvt/sles10_bind0.nasl |
2009-10-13 | Name : SLES10: Security update for libpng File : nvt/sles10_libpng.nasl |
2009-10-13 | Name : SLES10: Security update for libpng File : nvt/sles10_libpng0.nasl |
2009-10-11 | Name : SLES11: Security update for MozillaFirefox File : nvt/sles11_MozillaFirefox.nasl |
2009-10-11 | Name : SLES11: Security update for libpng File : nvt/sles11_libpng12-0.nasl |
2009-10-10 | Name : SLES9: Security update for libpng File : nvt/sles9p5012132.nasl |
2009-10-10 | Name : SLES9: Security update for bind File : nvt/sles9p5030189.nasl |
2009-10-10 | Name : SLES9: Security update for libpng File : nvt/sles9p5043440.nasl |
2009-10-10 | Name : SLES9: Security update for libpng File : nvt/sles9p5043680.nasl |
2009-07-29 | Name : Debian Security Advisory DSA 1830-1 (icedove) File : nvt/deb_1830_1.nasl |
2009-07-29 | Name : Ubuntu USN-799-1 (dbus) File : nvt/ubuntu_799_1.nasl |
2009-07-29 | Name : Ubuntu USN-801-1 (tiff) File : nvt/ubuntu_801_1.nasl |
2009-07-29 | Name : Ubuntu USN-802-1 (apache2) File : nvt/ubuntu_802_1.nasl |
2009-06-23 | Name : Fedora Core 10 FEDORA-2009-6531 (libpng) File : nvt/fcore_2009_6531.nasl |
2009-06-23 | Name : Fedora Core 9 FEDORA-2009-6603 (libpng) File : nvt/fcore_2009_6603.nasl |
2009-06-05 | Name : Ubuntu USN-723-1 (git-core) File : nvt/ubuntu_723_1.nasl |
2009-05-25 | Name : RedHat Security Advisory RHSA-2009:0329 File : nvt/RHSA_2009_0329.nasl |
2009-05-25 | Name : CentOS Security Advisory CESA-2009:0329 (freetype) File : nvt/ovcesa2009_0329.nasl |
2009-05-18 | Name : VMware Products Multiple Vulnerabilities (Linux) Apr09 File : nvt/secpod_vmware_prdts_mult_vuln_lin_apr09.nasl |
2009-05-18 | Name : VMware Products Multiple Vulnerabilities (Win) Apr09 File : nvt/secpod_vmware_prdts_mult_vuln_win_apr09.nasl |
2009-05-05 | Name : HP-UX Update for BIND HPSBUX02351 File : nvt/gb_hp_ux_HPSBUX02351.nasl |
2009-04-28 | Name : CentOS Security Advisory CESA-2009:0333 (libpng) File : nvt/ovcesa2009_0333.nasl |
2009-04-20 | Name : SuSE Security Advisory SUSE-SA:2009:023 (MozillaFirefox) File : nvt/suse_sa_2009_023.nasl |
2009-04-09 | Name : Mandriva Update for libpng MDKSA-2007:217 (libpng) File : nvt/gb_mandriva_MDKSA_2007_217.nasl |
2009-04-09 | Name : Mandriva Update for cairo MDVSA-2008:019 (cairo) File : nvt/gb_mandriva_MDVSA_2008_019.nasl |
2009-04-09 | Name : Mandriva Update for freetype2 MDVSA-2008:121 (freetype2) File : nvt/gb_mandriva_MDVSA_2008_121.nasl |
2009-04-09 | Name : Mandriva Update for bind MDVSA-2008:139 (bind) File : nvt/gb_mandriva_MDVSA_2008_139.nasl |
2009-04-06 | Name : Mandrake Security Advisory MDVSA-2009:083 (mozilla-thunderbird) File : nvt/mdksa_2009_083.nasl |
2009-03-31 | Name : Debian Security Advisory DSA 1750-1 (libpng) File : nvt/deb_1750_1.nasl |
2009-03-31 | Name : Fedora Core 10 FEDORA-2009-2882 (thunderbird) File : nvt/fcore_2009_2882.nasl |
2009-03-31 | Name : Fedora Core 9 FEDORA-2009-2884 (thunderbird) File : nvt/fcore_2009_2884.nasl |
2009-03-23 | Name : Ubuntu Update for libpng vulnerabilities USN-538-1 File : nvt/gb_ubuntu_USN_538_1.nasl |
2009-03-23 | Name : Ubuntu Update for libcairo vulnerability USN-550-1 File : nvt/gb_ubuntu_USN_550_1.nasl |
2009-03-23 | Name : Ubuntu Update for libcairo regression USN-550-2 File : nvt/gb_ubuntu_USN_550_2.nasl |
2009-03-23 | Name : Ubuntu Update for bind9 vulnerability USN-622-1 File : nvt/gb_ubuntu_USN_622_1.nasl |
2009-03-23 | Name : Ubuntu Update for dnsmasq vulnerability USN-627-1 File : nvt/gb_ubuntu_USN_627_1.nasl |
2009-03-23 | Name : Ubuntu Update for freetype vulnerabilities USN-643-1 File : nvt/gb_ubuntu_USN_643_1.nasl |
2009-03-23 | Name : Ubuntu Update for ruby1.8 vulnerabilities USN-651-1 File : nvt/gb_ubuntu_USN_651_1.nasl |
2009-03-20 | Name : Gentoo Security Advisory GLSA 200903-28 (libpng) File : nvt/glsa_200903_28.nasl |
2009-03-20 | Name : Mandrake Security Advisory MDVSA-2009:075 (firefox) File : nvt/mdksa_2009_075.nasl |
2009-03-20 | Name : SuSE Security Advisory SUSE-SA:2009:012 (MozillaFirefox) File : nvt/suse_sa_2009_012.nasl |
2009-03-13 | Name : Fedora Core 10 FEDORA-2009-1976 (libpng10) File : nvt/fcore_2009_1976.nasl |
2009-03-13 | Name : Fedora Core 9 FEDORA-2009-2045 (libpng10) File : nvt/fcore_2009_2045.nasl |
2009-03-13 | Name : CentOS Security Advisory CESA-2009:0315 (firefox) File : nvt/ovcesa2009_0315.nasl |
2009-03-13 | Name : CentOS Security Advisory CESA-2009:0325-01 (seamonkey) File : nvt/ovcesa2009_0325_01.nasl |
2009-03-13 | Name : CentOS Security Advisory CESA-2009:0333-01 (libpng) File : nvt/ovcesa2009_0333_01.nasl |
2009-03-13 | Name : CentOS Security Advisory CESA-2009:0340 (libpng) File : nvt/ovcesa2009_0340.nasl |
2009-03-07 | Name : RedHat Security Advisory RHSA-2009:0315 File : nvt/RHSA_2009_0315.nasl |
2009-03-07 | Name : RedHat Security Advisory RHSA-2009:0325 File : nvt/RHSA_2009_0325.nasl |
2009-03-07 | Name : RedHat Security Advisory RHSA-2009:0333 File : nvt/RHSA_2009_0333.nasl |
2009-03-07 | Name : RedHat Security Advisory RHSA-2009:0340 File : nvt/RHSA_2009_0340.nasl |
2009-03-07 | Name : FreeBSD Ports: pngcrush File : nvt/freebsd_pngcrush.nasl |
2009-03-07 | Name : CentOS Security Advisory CESA-2009:0325 (seamonkey) File : nvt/ovcesa2009_0325.nasl |
2009-03-07 | Name : Ubuntu USN-728-1 (xulrunner-1.9) File : nvt/ubuntu_728_1.nasl |
2009-03-07 | Name : Ubuntu USN-730-1 (libpng) File : nvt/ubuntu_730_1.nasl |
2009-03-06 | Name : RedHat Update for cairo RHSA-2007:1078-02 File : nvt/gb_RHSA-2007_1078-02_cairo.nasl |
2009-03-06 | Name : RedHat Update for bind RHSA-2008:0533-01 File : nvt/gb_RHSA-2008_0533-01_bind.nasl |
2009-03-06 | Name : RedHat Update for freetype RHSA-2008:0556-01 File : nvt/gb_RHSA-2008_0556-01_freetype.nasl |
2009-03-06 | Name : RedHat Update for freetype RHSA-2008:0558-01 File : nvt/gb_RHSA-2008_0558-01_freetype.nasl |
2009-03-06 | Name : RedHat Update for dnsmasq RHSA-2008:0789-01 File : nvt/gb_RHSA-2008_0789-01_dnsmasq.nasl |
2009-03-02 | Name : Fedora Core 10 FEDORA-2009-2112 (libpng) File : nvt/fcore_2009_2112.nasl |
2009-03-02 | Name : Fedora Core 9 FEDORA-2009-2128 (libpng) File : nvt/fcore_2009_2128.nasl |
2009-03-02 | Name : Fedora Core 10 FEDORA-2009-2131 (mingw32-libpng) File : nvt/fcore_2009_2131.nasl |
2009-03-02 | Name : Mandrake Security Advisory MDVSA-2009:051 (libpng) File : nvt/mdksa_2009_051.nasl |
2009-03-02 | Name : SuSE Security Summary SUSE-SR:2009:005 File : nvt/suse_sr_2009_005.nasl |
2009-02-27 | Name : CentOS Update for bind CESA-2008:0533-03 centos2 i386 File : nvt/gb_CESA-2008_0533-03_bind_centos2_i386.nasl |
2009-02-27 | Name : CentOS Update for bind CESA-2008:0533 centos3 i386 File : nvt/gb_CESA-2008_0533_bind_centos3_i386.nasl |
2009-02-27 | Name : CentOS Update for bind CESA-2008:0533 centos3 x86_64 File : nvt/gb_CESA-2008_0533_bind_centos3_x86_64.nasl |
2009-02-27 | Name : CentOS Update for bind CESA-2008:0533 centos4 i386 File : nvt/gb_CESA-2008_0533_bind_centos4_i386.nasl |
2009-02-27 | Name : CentOS Update for bind CESA-2008:0533 centos4 x86_64 File : nvt/gb_CESA-2008_0533_bind_centos4_x86_64.nasl |
2009-02-27 | Name : CentOS Update for freetype CESA-2008:0556 centos3 i386 File : nvt/gb_CESA-2008_0556_freetype_centos3_i386.nasl |
2009-02-27 | Name : CentOS Update for freetype CESA-2008:0556 centos3 x86_64 File : nvt/gb_CESA-2008_0556_freetype_centos3_x86_64.nasl |
2009-02-27 | Name : CentOS Update for freetype CESA-2008:0556 centos4 i386 File : nvt/gb_CESA-2008_0556_freetype_centos4_i386.nasl |
2009-02-27 | Name : CentOS Update for freetype CESA-2008:0556 centos4 x86_64 File : nvt/gb_CESA-2008_0556_freetype_centos4_x86_64.nasl |
2009-02-27 | Name : CentOS Update for freetype CESA-2008:0558-01 centos2 i386 File : nvt/gb_CESA-2008_0558-01_freetype_centos2_i386.nasl |
2009-02-27 | Name : Fedora Update for libpng10 FEDORA-2007-2521 File : nvt/gb_fedora_2007_2521_libpng10_fc7.nasl |
2009-02-27 | Name : Fedora Update for libpng FEDORA-2007-2666 File : nvt/gb_fedora_2007_2666_libpng_fc7.nasl |
2009-02-27 | Name : Fedora Update for libpng FEDORA-2007-734 File : nvt/gb_fedora_2007_734_libpng_fc6.nasl |
2009-02-24 | Name : Fedora Update for cairo FEDORA-2007-3818 File : nvt/gb_fedora_2007_3818_cairo_fc7.nasl |
2009-02-18 | Name : Fedora Core 9 FEDORA-2009-1069 (dnsmasq) File : nvt/fcore_2009_1069.nasl |
2009-02-17 | Name : Fedora Update for libpng10 FEDORA-2008-3979 File : nvt/gb_fedora_2008_3979_libpng10_fc7.nasl |
2009-02-17 | Name : Fedora Update for libpng FEDORA-2008-4947 File : nvt/gb_fedora_2008_4947_libpng_fc7.nasl |
2009-02-17 | Name : Fedora Update for freetype FEDORA-2008-5425 File : nvt/gb_fedora_2008_5425_freetype_fc9.nasl |
2009-02-17 | Name : Fedora Update for freetype FEDORA-2008-5430 File : nvt/gb_fedora_2008_5430_freetype_fc8.nasl |
2009-02-17 | Name : Fedora Update for bind FEDORA-2008-6256 File : nvt/gb_fedora_2008_6256_bind_fc9.nasl |
2009-02-17 | Name : Fedora Update for bind FEDORA-2008-6281 File : nvt/gb_fedora_2008_6281_bind_fc8.nasl |
2009-02-17 | Name : Fedora Update for ruby FEDORA-2008-8736 File : nvt/gb_fedora_2008_8736_ruby_fc8.nasl |
2009-02-17 | Name : Fedora Update for ruby FEDORA-2008-8738 File : nvt/gb_fedora_2008_8738_ruby_fc9.nasl |
2009-01-23 | Name : SuSE Update for bind SUSE-SA:2008:033 File : nvt/gb_suse_2008_033.nasl |
2009-01-23 | Name : SuSE Update for openwsman SUSE-SA:2008:041 File : nvt/gb_suse_2008_041.nasl |
2009-01-20 | Name : Fedora Core 9 FEDORA-2009-0350 (bind) File : nvt/fcore_2009_0350.nasl |
2009-01-13 | Name : Gentoo Security Advisory GLSA 200901-03 (pdnsd) File : nvt/glsa_200901_03.nasl |
2008-12-23 | Name : Gentoo Security Advisory GLSA 200812-17 (ruby) File : nvt/glsa_200812_17.nasl |
2008-12-15 | Name : VMware Products Trap Flag In-Guest Privilege Escalation Vulnerability (Linux) File : nvt/gb_vmware_prdts_inguest_prv_esc_vuln_lin.nasl |
2008-12-15 | Name : VMware Products Trap Flag In-Guest Privilege Escalation Vulnerability (Win) File : nvt/gb_vmware_prdts_inguest_prv_esc_vuln_win.nasl |
2008-09-29 | Name : VMware VIX API Multiple Buffer Overflow Vulnerabilities (Win) File : nvt/gb_vmware_prdts_vix_api_mult_vuln.nasl |
2008-09-26 | Name : VMware Product(s) Local Privilege Escalation Vulnerability File : nvt/gb_vmware_prdts_prv_esc_vuln.nasl |
2008-09-26 | Name : VMware Tools Local Privilege Escalation Vulnerability (Linux) File : nvt/gb_vmware_tools_local_prv_esc_vuln_lin.nasl |
2008-09-26 | Name : VMware Tools Local Privilege Escalation Vulnerability (Win) File : nvt/gb_vmware_tools_local_prv_esc_vuln_win.nasl |
2008-09-25 | Name : VMCI/HGFS VmWare Code Execution Vulnerability (Linux) File : nvt/gb_vmware_prdts_mult_vuln_lin.nasl |
2008-09-25 | Name : VMCI/HGFS VmWare Code Execution Vulnerability (Win) File : nvt/gb_vmware_prdts_mult_vuln_win.nasl |
2008-09-24 | Name : Gentoo Security Advisory GLSA 200711-08 (libpng) File : nvt/glsa_200711_08.nasl |
2008-09-24 | Name : Gentoo Security Advisory GLSA 200712-04 (cairo) File : nvt/glsa_200712_04.nasl |
2008-09-24 | Name : Gentoo Security Advisory GLSA 200712-24 (emul-linux-x86-gtklibs) File : nvt/glsa_200712_24.nasl |
2008-09-24 | Name : Gentoo Security Advisory GLSA 200805-07 (ltsp) File : nvt/glsa_200805_07.nasl |
2008-09-24 | Name : Gentoo Security Advisory GLSA 200806-10 (freetype) File : nvt/glsa_200806_10.nasl |
2008-09-24 | Name : Gentoo Security Advisory GLSA 200807-08 (bind) File : nvt/glsa_200807_08.nasl |
2008-09-24 | Name : Gentoo Security Advisory GLSA 200809-02 (dnsmasq) File : nvt/glsa_200809_02.nasl |
2008-09-17 | Name : Debian Security Advisory DSA 1635-1 (freetype) File : nvt/deb_1635_1.nasl |
2008-09-04 | Name : FreeBSD Ports: freetype2 File : nvt/freebsd_freetype21.nasl |
2008-09-04 | Name : FreeBSD Ports: png File : nvt/freebsd_png0.nasl |
2008-09-04 | Name : FreeBSD Ports: ruby, ruby+pthreads, ruby+pthreads+oniguruma, ruby+oniguruma File : nvt/freebsd_ruby9.nasl |
2008-09-04 | Name : FreeBSD Security Advisory (FreeBSD-SA-08:06.bind.asc) File : nvt/freebsdsa_bind5.nasl |
2008-08-22 | Name : Vulnerabilities in DNS Could Allow Spoofing (953230) File : nvt/secpod_ms08-037_900005.nasl |
2008-08-15 | Name : Debian Security Advisory DSA 1617-1 (refpolicy) File : nvt/deb_1617_1.nasl |
2008-08-15 | Name : Debian Security Advisory DSA 1619-1 (python-dns) File : nvt/deb_1619_1.nasl |
2008-08-15 | Name : Debian Security Advisory DSA 1623-1 (dnsmasq) File : nvt/deb_1623_1.nasl |
2008-07-15 | Name : Debian Security Advisory DSA 1603-1 (bind9) File : nvt/deb_1603_1.nasl |
2008-04-21 | Name : Debian Security Advisory DSA 1542-1 (libcairo) File : nvt/deb_1542_1.nasl |
0000-00-00 | Name : Slackware Advisory SSA:2007-325-01 libpng File : nvt/esoft_slk_ssa_2007_325_01.nasl |
0000-00-00 | Name : Slackware Advisory SSA:2007-325-01a libpng for Slackware 10.1 and 10.2 File : nvt/esoft_slk_ssa_2007_325_01a.nasl |
0000-00-00 | Name : Slackware Advisory SSA:2007-337-01 cairo File : nvt/esoft_slk_ssa_2007_337_01.nasl |
0000-00-00 | Name : Slackware Advisory SSA:2008-191-02 bind File : nvt/esoft_slk_ssa_2008_191_02.nasl |
0000-00-00 | Name : Slackware Advisory SSA:2008-205-01 dnsmasq File : nvt/esoft_slk_ssa_2008_205_01.nasl |
0000-00-00 | Name : Slackware Advisory SSA:2008-334-01 ruby File : nvt/esoft_slk_ssa_2008_334_01.nasl |
0000-00-00 | Name : Slackware Advisory SSA:2009-051-01 libpng File : nvt/esoft_slk_ssa_2009_051_01.nasl |
0000-00-00 | Name : Slackware Advisory SSA:2009-083-02 seamonkey File : nvt/esoft_slk_ssa_2009_083_02.nasl |
0000-00-00 | Name : Slackware Advisory SSA:2009-083-03 mozilla-thunderbird File : nvt/esoft_slk_ssa_2009_083_03.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
76060 | VMware Multiple Product UDF Filesystem ISO Image Handling Overflow |
64440 | VMware View View Manager Unspecified Parameter XSS |
64127 | VMware Multiple Products vmware-authd.exe Multiple Command \x25\x90 Sequence ... |
63860 | VMWare Multiple Products USB Service Host Privilege Escalation |
63859 | VMWare Tools Unsafe Library Loading Arbitrary Code Execution |
63858 | VMware Tools Malformed Executable Guest Arbitrary Code Execution |
63607 | VMware Fusion vmware-vmx Process Virtual Networking Stack Memory Disclosure |
63606 | VMware VIX API vmrun Utility Process List Format String Local Privilege Escal... |
63605 | VMware Remote Console (VMrc) Plugin Unspecified Format String |
63319 | VMware Server Console Virtual Machine Name XSS VMware WebAccess contains a flaw that allows a remote cross site scripting (XSS) attack. This flaw exists because the application does not validate the virtual machine name in the machines listing. This may allow a user to create a specially crafted URL that would execute arbitrary script code in a user's browser within the trust relationship between their browser and the server. |
59441 | VMware Multiple Products Guest OS Page Fault Local Privilege Escalation |
59440 | VMware Multiple Products sdk Path HTTP Request Directory Traversal Arbitrary ... VMWare hosted products contain a flaw that allows a remote attacker to traverse outside of a restricted path. The issue is due to the HTTP server not properly sanitizing user input, specifically directory traversal style attacks (e.g., ../../) appended to the /sdk path. This directory traversal attack would allow the attacker to read arbitrary files on the host, including guest virtual machines. |
58728 | VMware Multiple Products Authorization Service vmware-authd.exe Login Request... |
55943 | VMWare Multiple Products VMnc Codec (vmnc.dll) Invalid RFB Message Type Handl... |
55942 | VMWare Multiple Products VMnc Codec (vmnc.dll) Open-DML Standard Index dwSize... |
53917 | HP Multiple Products DNS Query ID Field Prediction Cache Poisoning |
53694 | VMware Multiple Products Guest Virtual Device Driver Unspecified DoS |
53634 | VMware Multiple Products Display Function Host OS Arbitrary Code Execution |
53530 | Check Point DNS Query ID Field Prediction Cache Poisoning |
53317 | libpng 16-bit Gamma Table Handling Uninitialised Pointer Free Arbitrary Code ... |
53316 | libpng pCAL Chunk Handling Uninitialised Pointer Free Arbitrary Code Execution |
53315 | libpng png_read_png Function Uninitialised Pointer Free Arbitrary Code Execution |
52704 | VMware Multiple Products Unspecified Virtual Hardware Request Memory Corruption |
49795 | VMware Multiple Products CPU Hardware Emulation Trap Flag Handling Guest OS U... |
48256 | Ingate Firewall/SIParator DNS Query ID Field Prediction Cache Poisoning |
48254 | VMware ESX / ESXi VMware Consolidated Backup (VCB) Multiple Utility Command L... |
48244 | pdnsd DNS Query ID Field Prediction Cache Poisoning |
48186 | Apple Mac OS X DNS Query ID Field Prediction Cache Poisoning |
47927 | Nortel Business Communications Manager DNS Query ID Field Prediction Cache Po... |
47926 | Astaro Security Gateway DNS Query ID Field Prediction Cache Poisoning |
47916 | Citrix Access Gateway DNS Query ID Field Prediction Cache Poisoning |
47660 | VitalQIP DNS Query ID Field Prediction Cache Poisoning |
47588 | Yamaha RT Series Routers DNS Query ID Field Prediction Cache Poisoning |
47546 | Astaro Security Gateway DNS Proxy DNS Query ID Field Prediction Cache Poisoning |
47510 | Dnsmasq DNS Query ID Field Prediction Cache Poisoning |
47233 | Secure Computing Sidewinder / CyberGuard DNS Query ID Field Prediction Cache ... |
47232 | F5 Multiple Product DNS Query ID Field Prediction Cache Poisoning |
46916 | Juniper Networks Multiple Products DNS Query ID Field Prediction Cache Poisoning |
46837 | Solaris named(1M) DNS Query ID Field Prediction Cache Poisoning Solaris contains a flaw that may allow a malicious user to insert invalid records into a recursive DNS server cache. The issue is triggered by a flaw in the DNS protocol, which does not require sufficient randomness in selecting Query ID and UDP source port for queries to authoritative servers. It is possible that the flaw may allow an attacker to spoof a DNS response to a legitimate query resulting in a loss of integrity. |
46836 | Nominum CNS / Vantio DNS Query ID Field Prediction Cache Poisoning |
46786 | Cisco Multiple Products DNS Query ID Field Prediction Cache Poisoning Multiple Cisco products contain a flaw that may allow a malicious user to insert invalid records into a recursive DNS server cache. The issue is triggered by a flaw in the DNS protocol, which does not require sufficient randomness in selecting Query ID and UDP source port for queries to authoritative servers. It is possible that the flaw may allow an attacker to spoof a DNS response to a legitimate query resulting in a loss of integrity. |
46777 | Microsoft Windows DNS Socket Entropy Weakness Cache Poisoning Windows contains a flaw that may allow a malicious user to insert invalid records into a recursive DNS server cache. The issue is triggered by a flaw in the DNS protocol, which does not require sufficient randomness in selecting Query ID and UDP source port for queries to authoritative servers. It is possible that the flaw may allow an attacker to spoof a DNS response to a legitimate query resulting in a loss of integrity. |
46776 | ISC BIND DNS Query ID Field Prediction Cache Poisoning BIND contains a flaw that may allow a malicious user to insert invalid records into a recursive DNS server cache. The issue is triggered by a flaw in the DNS protocol, which does not require sufficient randomness in selecting Query ID and UDP source port for queries to authoritative servers. It is possible that the flaw may allow an attacker to spoof a DNS response to a legitimate query resulting in a loss of integrity. |
46205 | VMware Multiple Products HGFS.sys user-mode METHOD_NEITHER IOCTLs Local Privi... |
46204 | VMware Multiple Products vmware-authd Search Path Subversion Local Privilege ... |
46203 | VMware Multiple Products VIX API Unspecified VM Host Arbitrary Code Execution |
46178 | FreeType2 Library TrueType Font (TTF) Font Handling Off-by-one Overflow |
46177 | FreeType2 Library Printer Font Binary (PFB) Font Handling Off-by-one Overflow |
46176 | FreeType2 Library Printer Font Binary (PFB) Font Handling Memory Corruption |
46175 | FreeType2 Library Printer Font Binary (PFB) Font Handling Overflow |
45890 | VMware Multiple Products Host Guest File System (HGFS) Shared Folders Feature... |
43901 | VMware Multiple Products authd Process Arbitrary Named Pipe Unspecified Loca... |
43900 | VMware Multiple Products DHCP Service Unspecified DoS |
43899 | VMware Multiple Products Crafted Virtual Machine Communication Interface (VM... |
43898 | VMware Multiple Products authd Process Named Pipe Manipulation Local Privile... |
43897 | VMware Multiple Products Application Data Folder config.ini Handling Local P... VMware Server contains a flaw that may allow a malicious local user to gain access to unauthorized privileges. The issue is triggered when 'authd' connects to opened pipes controled by the attacker occurs. This flaw may lead to a loss of Confidentiality and Integrity. |
43896 | VMware Multiple Products Anonymous VIX API Call Guest OS Console Access |
39242 | Cairo read_png PNG Image Size Overflow |
38274 | libpng Chunk Handlers PNG Handling Multiple Method DoS |
Information Assurance Vulnerability Management (IAVM)
Date | Description |
---|---|
2010-04-15 | IAVM : 2010-A-0066 - Multiple Vulnerabilities in VMware Products Severity : Category I - VMSKEY : V0023997 |
2010-04-08 | IAVM : 2010-B-0028 - Multiple Vulnerabilities in VMware WebAccess Severity : Category II - VMSKEY : V0023906 |
2009-04-09 | IAVM : 2009-B-0015 - Multiple Vulnerabilities in VMware Severity : Category I - VMSKEY : V0018638 |
2008-07-17 | IAVM : 2008-A-0045 - DNS Protocol Cache Poisoning Vulnerability Severity : Category I - VMSKEY : V0016170 |
Snort® IPS/IDS
Date | Description |
---|---|
2014-12-23 | Microsoft and libpng multiple products PNG large image width overflow attempt RuleID : 32889-community - Revision : 2 - Type : FILE-IMAGE |
2015-01-23 | Microsoft and libpng multiple products PNG large image width overflow attempt RuleID : 32889 - Revision : 2 - Type : FILE-IMAGE |
2014-01-10 | Microsoft Multiple Products PNG large image height download attempt RuleID : 3133-community - Revision : 15 - Type : FILE-IMAGE |
2014-01-10 | Microsoft Multiple Products PNG large image height download attempt RuleID : 3133 - Revision : 15 - Type : FILE-IMAGE |
2014-01-10 | Microsoft and libpng multiple products PNG large image width overflow attempt RuleID : 3132-community - Revision : 15 - Type : FILE-IMAGE |
2014-01-10 | Microsoft and libpng multiple products PNG large image width overflow attempt RuleID : 3132 - Revision : 15 - Type : FILE-IMAGE |
2014-01-10 | VMWare Remote Console format string code execution attempt RuleID : 27658 - Revision : 3 - Type : BROWSER-PLUGINS |
2014-01-10 | VMWare Remote Console format string code execution attempt RuleID : 27657 - Revision : 3 - Type : BROWSER-PLUGINS |
2014-01-10 | VMWare Remote Console format string code execution attempt RuleID : 27656 - Revision : 4 - Type : BROWSER-PLUGINS |
2014-01-10 | PcVue SVUIGrd.ocx ActiveX function call access RuleID : 27112 - Revision : 5 - Type : BROWSER-PLUGINS |
2014-01-10 | PcVue SVUIGrd.ocx ActiveX clsid access RuleID : 27111 - Revision : 5 - Type : BROWSER-PLUGINS |
2014-01-10 | VMWare authorization service user credential parsing DoS attempt RuleID : 20058 - Revision : 4 - Type : SERVER-OTHER |
2014-01-10 | VMWare Remote Console format string code execution attempt RuleID : 18097 - Revision : 14 - Type : BROWSER-PLUGINS |
2014-01-10 | Adobe .pfb file download request RuleID : 16552 - Revision : 13 - Type : FILE-IDENTIFY |
2014-01-10 | Microsoft Windows DNS server spoofing attempt RuleID : 16206 - Revision : 12 - Type : OS-WINDOWS |
2014-01-10 | libpng malformed chunk denial of service attempt RuleID : 14772 - Revision : 7 - Type : FILE-IMAGE |
2014-01-10 | excessive outbound NXDOMAIN replies - possible spoof of domain run by local D... RuleID : 13949 - Revision : 17 - Type : PROTOCOL-DNS |
2014-01-10 | large number of NXDOMAIN replies - possible DNS cache poisoning RuleID : 13948 - Revision : 13 - Type : PROTOCOL-DNS |
2014-01-10 | dns cache poisoning attempt RuleID : 13667 - Revision : 19 - Type : PROTOCOL-DNS |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2017-04-21 | Name : The remote OracleVM host is missing one or more security updates. File : oraclevm_OVMSA-2017-0066.nasl - Type : ACT_GATHER_INFO |
2016-03-08 | Name : The remote VMware ESX host is missing a security-related patch. File : vmware_VMSA-2010-0007_remote.nasl - Type : ACT_GATHER_INFO |
2014-12-15 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201412-08.nasl - Type : ACT_GATHER_INFO |
2014-12-15 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201412-11.nasl - Type : ACT_GATHER_INFO |
2014-11-26 | Name : The remote OracleVM host is missing a security update. File : oraclevm_OVMSA-2009-0012.nasl - Type : ACT_GATHER_INFO |
2014-11-26 | Name : The remote OracleVM host is missing a security update. File : oraclevm_OVMSA-2009-0022.nasl - Type : ACT_GATHER_INFO |
2014-10-10 | Name : The remote device is missing a vendor-supplied security patch. File : f5_bigip_SOL8938.nasl - Type : ACT_GATHER_INFO |
2014-10-10 | Name : The remote device is missing a vendor-supplied security patch. File : f5_bigip_SOL9988.nasl - Type : ACT_GATHER_INFO |
2014-03-05 | Name : The DNS server running on the remote host is vulnerable to DNS spoofing attacks. File : ms_dns_kb951746.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2007-0992.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2008-0533.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2008-0556.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing a security update. File : oraclelinux_ELSA-2008-0789.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2009-0315.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2009-0325.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2009-0329.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2009-0333.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2009-0340.nasl - Type : ACT_GATHER_INFO |
2012-10-01 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201209-25.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20071023_libpng_on_SL3.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20071023_libpng_on_SL5_x.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20071129_cairo_on_SL5_x.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20080620_freetype_on_SL3_x.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20080711_bind_on_SL_3_0_x.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing a security update. File : sl_20080811_dnsmasq_on_SL5_x.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20090304_firefox_on_SL4_x.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20090304_libpng_on_SL3_x.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20090304_seamonkey_on_SL3_x.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20090522_freetype_on_SL3_x.nasl - Type : ACT_GATHER_INFO |
2011-09-21 | Name : The remote VMware ESX host is missing a security-related patch. File : vmware_VMSA-2010-0007.nasl - Type : ACT_GATHER_INFO |
2011-06-06 | Name : The remote host has a virtualization application affected by multiple vulnera... File : macosx_fusion_3_1_3.nasl - Type : ACT_GATHER_INFO |
2011-05-28 | Name : The remote Slackware host is missing a security update. File : Slackware_SSA_2008-191-02.nasl - Type : ACT_GATHER_INFO |
2010-09-01 | Name : The remote device is missing a vendor-supplied security patch. File : cisco-sa-20080708-dnshttp.nasl - Type : ACT_GATHER_INFO |
2010-09-01 | Name : The remote device is missing a vendor-supplied security patch. File : cisco-sa-20080924-iosipshttp.nasl - Type : ACT_GATHER_INFO |
2010-04-15 | Name : The remote host has a virtualization application affected by multiple vulnera... File : vmware_multiple_vmsa_2010_0007.nasl - Type : ACT_GATHER_INFO |
2010-02-24 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-1830.nasl - Type : ACT_GATHER_INFO |
2010-02-17 | Name : A web application on the remote host has a directory traversal vulnerability. File : vmware_dir_traversal_vmsa_2009_0015.nasl - Type : ACT_ATTACK |
2010-01-06 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2009-0333.nasl - Type : ACT_GATHER_INFO |
2009-10-29 | Name : The remote host has a virtualization application affected by a privilege esca... File : vmware_multiple_vmsa_2009_0015.nasl - Type : ACT_GATHER_INFO |
2009-10-28 | Name : The remote VMware ESXi / ESX host is missing one or more security-related pat... File : vmware_VMSA-2009-0015.nasl - Type : ACT_GATHER_INFO |
2009-09-24 | Name : The remote SuSE 9 host is missing a security-related patch. File : suse9_11956.nasl - Type : ACT_GATHER_INFO |
2009-09-24 | Name : The remote SuSE 9 host is missing a security-related patch. File : suse9_12197.nasl - Type : ACT_GATHER_INFO |
2009-09-24 | Name : The remote SuSE 9 host is missing a security-related patch. File : suse9_12353.nasl - Type : ACT_GATHER_INFO |
2009-09-24 | Name : The remote SuSE 9 host is missing a security-related patch. File : suse9_12358.nasl - Type : ACT_GATHER_INFO |
2009-09-24 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_MozillaFirefox-090319.nasl - Type : ACT_GATHER_INFO |
2009-09-24 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_libpng-090317.nasl - Type : ACT_GATHER_INFO |
2009-09-24 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_MozillaFirefox-6187.nasl - Type : ACT_GATHER_INFO |
2009-09-24 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_libpng-6003.nasl - Type : ACT_GATHER_INFO |
2009-09-24 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_libpng-6024.nasl - Type : ACT_GATHER_INFO |
2009-08-05 | Name : The remote host is missing a Mac OS X update that fixes various security issues. File : macosx_10_5_8.nasl - Type : ACT_GATHER_INFO |
2009-08-05 | Name : The remote host is missing a Mac OS X update that fixes various security issues. File : macosx_SecUpd2009-003.nasl - Type : ACT_GATHER_INFO |
2009-07-27 | Name : The remote VMware ESXi / ESX host is missing one or more security-related pat... File : vmware_VMSA-2008-0009.nasl - Type : ACT_GATHER_INFO |
2009-07-27 | Name : The remote VMware ESXi / ESX host is missing one or more security-related pat... File : vmware_VMSA-2008-0014.nasl - Type : ACT_GATHER_INFO |
2009-07-27 | Name : The remote VMware ESXi / ESX host is missing a security-related patch. File : vmware_VMSA-2008-0018.nasl - Type : ACT_GATHER_INFO |
2009-07-27 | Name : The remote VMware ESXi / ESX host is missing one or more security-related pat... File : vmware_VMSA-2008-0019.nasl - Type : ACT_GATHER_INFO |
2009-07-27 | Name : The remote VMware ESXi / ESX host is missing one or more security-related pat... File : vmware_VMSA-2009-0005.nasl - Type : ACT_GATHER_INFO |
2009-07-27 | Name : The remote VMware ESXi / ESX host is missing a security-related patch. File : vmware_VMSA-2009-0006.nasl - Type : ACT_GATHER_INFO |
2009-07-27 | Name : The remote VMware ESX host is missing a security-related patch. File : vmware_VMSA-2009-0007.nasl - Type : ACT_GATHER_INFO |
2009-07-21 | Name : The remote openSUSE host is missing a security update. File : suse_11_0_MozillaFirefox-090312.nasl - Type : ACT_GATHER_INFO |
2009-07-21 | Name : The remote openSUSE host is missing a security update. File : suse_11_0_bind-080708.nasl - Type : ACT_GATHER_INFO |
2009-07-21 | Name : The remote openSUSE host is missing a security update. File : suse_11_0_dnsmasq-080813.nasl - Type : ACT_GATHER_INFO |
2009-07-21 | Name : The remote openSUSE host is missing a security update. File : suse_11_0_libpng-devel-090217.nasl - Type : ACT_GATHER_INFO |
2009-07-21 | Name : The remote openSUSE host is missing a security update. File : suse_11_0_libpng-devel-090225.nasl - Type : ACT_GATHER_INFO |
2009-07-21 | Name : The remote openSUSE host is missing a security update. File : suse_11_0_seamonkey-090617.nasl - Type : ACT_GATHER_INFO |
2009-07-21 | Name : The remote openSUSE host is missing a security update. File : suse_11_1_MozillaFirefox-090312.nasl - Type : ACT_GATHER_INFO |
2009-07-21 | Name : The remote openSUSE host is missing a security update. File : suse_11_1_libpng-devel-090217.nasl - Type : ACT_GATHER_INFO |
2009-07-21 | Name : The remote openSUSE host is missing a security update. File : suse_11_1_libpng-devel-090225.nasl - Type : ACT_GATHER_INFO |
2009-07-21 | Name : The remote openSUSE host is missing a security update. File : suse_11_1_seamonkey-090617.nasl - Type : ACT_GATHER_INFO |
2009-06-19 | Name : The remote openSUSE host is missing a security update. File : suse_seamonkey-6310.nasl - Type : ACT_GATHER_INFO |
2009-06-09 | Name : The remote host contains a web browser that is affected by several vulnerabil... File : safari_4.0.nasl - Type : ACT_GATHER_INFO |
2009-05-23 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2009-0329.nasl - Type : ACT_GATHER_INFO |
2009-05-23 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2009-0329.nasl - Type : ACT_GATHER_INFO |
2009-05-13 | Name : The remote host is missing a Mac OS X update that fixes various security issues. File : macosx_10_5_7.nasl - Type : ACT_GATHER_INFO |
2009-04-23 | Name : The remote Fedora host is missing a security update. File : fedora_2009-1976.nasl - Type : ACT_GATHER_INFO |
2009-04-23 | Name : The remote Fedora host is missing a security update. File : fedora_2009-2112.nasl - Type : ACT_GATHER_INFO |
2009-04-23 | Name : The remote Fedora host is missing a security update. File : fedora_2009-2131.nasl - Type : ACT_GATHER_INFO |
2009-04-23 | Name : The remote Fedora host is missing a security update. File : fedora_2009-2882.nasl - Type : ACT_GATHER_INFO |
2009-04-23 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2008-019.nasl - Type : ACT_GATHER_INFO |
2009-04-23 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2008-121.nasl - Type : ACT_GATHER_INFO |
2009-04-23 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2008-139.nasl - Type : ACT_GATHER_INFO |
2009-04-23 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2009-051.nasl - Type : ACT_GATHER_INFO |
2009-04-23 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2009-075.nasl - Type : ACT_GATHER_INFO |
2009-04-23 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2009-083.nasl - Type : ACT_GATHER_INFO |
2009-04-23 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-643-1.nasl - Type : ACT_GATHER_INFO |
2009-04-23 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-651-1.nasl - Type : ACT_GATHER_INFO |
2009-04-23 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-728-1.nasl - Type : ACT_GATHER_INFO |
2009-04-23 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-730-1.nasl - Type : ACT_GATHER_INFO |
2009-04-21 | Name : The remote openSUSE host is missing a security update. File : suse_MozillaFirefox-6194.nasl - Type : ACT_GATHER_INFO |
2009-04-09 | Name : The remote host has an application that is affected by multiple issues. File : vmware_multiple_vmsa_2009_0005.nasl - Type : ACT_GATHER_INFO |
2009-03-25 | Name : The remote Slackware host is missing a security update. File : Slackware_SSA_2009-083-02.nasl - Type : ACT_GATHER_INFO |
2009-03-25 | Name : The remote Slackware host is missing a security update. File : Slackware_SSA_2009-083-03.nasl - Type : ACT_GATHER_INFO |
2009-03-23 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-1750.nasl - Type : ACT_GATHER_INFO |
2009-03-22 | Name : The remote Fedora host is missing a security update. File : fedora_2009-2884.nasl - Type : ACT_GATHER_INFO |
2009-03-20 | Name : The remote Windows host contains a mail client that is affected by multiple v... File : mozilla_thunderbird_20021.nasl - Type : ACT_GATHER_INFO |
2009-03-20 | Name : A web browser on the remote host is affected by multiple vulnerabilities. File : seamonkey_1115.nasl - Type : ACT_GATHER_INFO |
2009-03-16 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-200903-28.nasl - Type : ACT_GATHER_INFO |
2009-03-10 | Name : The remote Fedora host is missing a security update. File : fedora_2009-2045.nasl - Type : ACT_GATHER_INFO |
2009-03-08 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2009-0315.nasl - Type : ACT_GATHER_INFO |
2009-03-06 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2009-0325.nasl - Type : ACT_GATHER_INFO |
2009-03-05 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2009-0340.nasl - Type : ACT_GATHER_INFO |
2009-03-05 | Name : The remote FreeBSD host is missing a security-related update. File : freebsd_pkg_ea2411a408e811deb88a0022157515b2.nasl - Type : ACT_GATHER_INFO |
2009-03-05 | Name : The remote Windows host contains a web browser that is affected by multiple v... File : mozilla_firefox_307.nasl - Type : ACT_GATHER_INFO |
2009-03-05 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2009-0315.nasl - Type : ACT_GATHER_INFO |
2009-03-05 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2009-0325.nasl - Type : ACT_GATHER_INFO |
2009-03-05 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2009-0333.nasl - Type : ACT_GATHER_INFO |
2009-03-05 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2009-0340.nasl - Type : ACT_GATHER_INFO |
2009-02-27 | Name : The remote Fedora host is missing a security update. File : fedora_2009-2128.nasl - Type : ACT_GATHER_INFO |
2009-02-27 | Name : The remote openSUSE host is missing a security update. File : suse_libpng-6021.nasl - Type : ACT_GATHER_INFO |
2009-02-24 | Name : The remote openSUSE host is missing a security update. File : suse_libpng-6001.nasl - Type : ACT_GATHER_INFO |
2009-02-23 | Name : The remote Slackware host is missing a security update. File : Slackware_SSA_2009-051-01.nasl - Type : ACT_GATHER_INFO |
2009-02-17 | Name : The remote Fedora host is missing a security update. File : fedora_2009-1069.nasl - Type : ACT_GATHER_INFO |
2009-02-13 | Name : The remote host is missing a Mac OS X update that fixes various security issues. File : macosx_SecUpd2009-001.nasl - Type : ACT_GATHER_INFO |
2009-01-12 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-200901-03.nasl - Type : ACT_GATHER_INFO |
2008-12-17 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-200812-17.nasl - Type : ACT_GATHER_INFO |
2008-12-01 | Name : The remote Slackware host is missing a security update. File : Slackware_SSA_2008-334-01.nasl - Type : ACT_GATHER_INFO |
2008-11-19 | Name : The remote Windows host has an application that is affected by multiple vulne... File : vmware_multiple_vmsa_2008_0018.nasl - Type : ACT_GATHER_INFO |
2008-10-10 | Name : The remote Fedora host is missing a security update. File : fedora_2008-8738.nasl - Type : ACT_GATHER_INFO |
2008-09-16 | Name : The remote host is missing a Mac OS X update that fixes various security issues. File : macosx_10_5_5.nasl - Type : ACT_GATHER_INFO |
2008-09-16 | Name : The remote host is missing a Mac OS X update that fixes various security issues. File : macosx_SecUpd2008-006.nasl - Type : ACT_GATHER_INFO |
2008-09-11 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-1635.nasl - Type : ACT_GATHER_INFO |
2008-09-05 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-200809-02.nasl - Type : ACT_GATHER_INFO |
2008-08-17 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_959d384d6b5911dd9d79001fc61c2a55.nasl - Type : ACT_GATHER_INFO |
2008-08-15 | Name : The remote openSUSE host is missing a security update. File : suse_dnsmasq-5512.nasl - Type : ACT_GATHER_INFO |
2008-08-12 | Name : The remote HP-UX host is missing a security-related patch. File : hpux_PHNE_37865.nasl - Type : ACT_GATHER_INFO |
2008-08-12 | Name : The remote Red Hat host is missing a security update. File : redhat-RHSA-2008-0789.nasl - Type : ACT_GATHER_INFO |
2008-08-01 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-1623.nasl - Type : ACT_GATHER_INFO |
2008-08-01 | Name : The remote host is missing a Mac OS X update that fixes various security issues. File : macosx_SecUpd2008-005.nasl - Type : ACT_GATHER_INFO |
2008-07-28 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-1617.nasl - Type : ACT_GATHER_INFO |
2008-07-28 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-1619.nasl - Type : ACT_GATHER_INFO |
2008-07-24 | Name : The remote Slackware host is missing a security update. File : Slackware_SSA_2008-205-01.nasl - Type : ACT_GATHER_INFO |
2008-07-23 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-627-1.nasl - Type : ACT_GATHER_INFO |
2008-07-15 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-200807-08.nasl - Type : ACT_GATHER_INFO |
2008-07-15 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_bind-5409.nasl - Type : ACT_GATHER_INFO |
2008-07-15 | Name : The remote openSUSE host is missing a security update. File : suse_bind-5410.nasl - Type : ACT_GATHER_INFO |
2008-07-10 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2008-0533.nasl - Type : ACT_GATHER_INFO |
2008-07-10 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-1603.nasl - Type : ACT_GATHER_INFO |
2008-07-10 | Name : The remote Fedora host is missing a security update. File : fedora_2008-6256.nasl - Type : ACT_GATHER_INFO |
2008-07-10 | Name : The remote Fedora host is missing a security update. File : fedora_2008-6281.nasl - Type : ACT_GATHER_INFO |
2008-07-10 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2008-0533.nasl - Type : ACT_GATHER_INFO |
2008-07-10 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-622-1.nasl - Type : ACT_GATHER_INFO |
2008-07-09 | Name : The remote name resolver (or the server it uses upstream) is affected by a DN... File : dns_non_random_source_ports.nasl - Type : ACT_GATHER_INFO |
2008-07-08 | Name : The remote FreeBSD host is missing a security-related update. File : freebsd_pkg_4fb43b2f46a911dd9d3800163e000016.nasl - Type : ACT_GATHER_INFO |
2008-07-08 | Name : The remote host is vulnerable to DNS spoofing attacks. File : smb_nt_ms08-037.nasl - Type : ACT_GATHER_INFO |
2008-06-24 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2008-0556.nasl - Type : ACT_GATHER_INFO |
2008-06-24 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-200806-10.nasl - Type : ACT_GATHER_INFO |
2008-06-24 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2008-0556.nasl - Type : ACT_GATHER_INFO |
2008-06-24 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2008-0558.nasl - Type : ACT_GATHER_INFO |
2008-06-19 | Name : The remote Fedora host is missing a security update. File : fedora_2008-5425.nasl - Type : ACT_GATHER_INFO |
2008-06-19 | Name : The remote Fedora host is missing a security update. File : fedora_2008-5430.nasl - Type : ACT_GATHER_INFO |
2008-06-09 | Name : The remote Windows host has an application that is affected by multiple issues. File : vmware_multiple_vmsa_2008_0009.nasl - Type : ACT_GATHER_INFO |
2008-06-09 | Name : The remote host contains an application that is affected by multiple buffer o... File : vmware_vix_api_buffer_overflow.nasl - Type : ACT_GATHER_INFO |
2008-06-03 | Name : The remote Windows host has an application that is affected by multiple issues. File : vmware_multiple_vmsa_2008_0008.nasl - Type : ACT_GATHER_INFO |
2008-05-29 | Name : The remote host is missing a Mac OS X update that fixes various security issues. File : macosx_10_5_3.nasl - Type : ACT_GATHER_INFO |
2008-05-29 | Name : The remote host is missing a Mac OS X update that fixes various security issues. File : macosx_SecUpd2008-003.nasl - Type : ACT_GATHER_INFO |
2008-04-17 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-1542.nasl - Type : ACT_GATHER_INFO |
2008-04-02 | Name : The remote Windows host has an application that is affected by multiple issues. File : vmware_multiple_vmsa_2008_0005.nasl - Type : ACT_GATHER_INFO |
2008-03-19 | Name : The remote host is missing a Mac OS X update that fixes various security issues. File : macosx_SecUpd2008-002.nasl - Type : ACT_GATHER_INFO |
2008-03-04 | Name : The remote host is missing Sun Security Patch number 137080-11 File : solaris10_137080.nasl - Type : ACT_GATHER_INFO |
2008-03-04 | Name : The remote host is missing Sun Security Patch number 137081-11 File : solaris10_x86_137081.nasl - Type : ACT_GATHER_INFO |
2008-02-06 | Name : The remote openSUSE host is missing a security update. File : suse_cairo-4947.nasl - Type : ACT_GATHER_INFO |
2008-02-06 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_cairo-4961.nasl - Type : ACT_GATHER_INFO |
2008-01-21 | Name : The remote Fedora host is missing a security update. File : fedora_2007-3818.nasl - Type : ACT_GATHER_INFO |
2007-12-13 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_libpng-4627.nasl - Type : ACT_GATHER_INFO |
2007-12-11 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-200712-04.nasl - Type : ACT_GATHER_INFO |
2007-12-04 | Name : The remote Slackware host is missing a security update. File : Slackware_SSA_2007-337-01.nasl - Type : ACT_GATHER_INFO |
2007-12-04 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-550-1.nasl - Type : ACT_GATHER_INFO |
2007-11-30 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2007-1078.nasl - Type : ACT_GATHER_INFO |
2007-11-26 | Name : The remote Slackware host is missing a security update. File : Slackware_SSA_2007-325-01.nasl - Type : ACT_GATHER_INFO |
2007-11-26 | Name : The remote openSUSE host is missing a security update. File : suse_libpng-4628.nasl - Type : ACT_GATHER_INFO |
2007-11-14 | Name : The remote Mandrake Linux host is missing one or more security updates. File : mandrake_MDKSA-2007-217.nasl - Type : ACT_GATHER_INFO |
2007-11-10 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-538-1.nasl - Type : ACT_GATHER_INFO |
2007-11-08 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-200711-08.nasl - Type : ACT_GATHER_INFO |
2007-11-06 | Name : The remote Fedora host is missing a security update. File : fedora_2007-2521.nasl - Type : ACT_GATHER_INFO |
2007-11-06 | Name : The remote Fedora host is missing a security update. File : fedora_2007-2666.nasl - Type : ACT_GATHER_INFO |
2007-11-06 | Name : The remote Fedora Core host is missing a security update. File : fedora_2007-734.nasl - Type : ACT_GATHER_INFO |
2007-10-25 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2007-0992.nasl - Type : ACT_GATHER_INFO |
2007-10-25 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2007-0992.nasl - Type : ACT_GATHER_INFO |
2007-10-17 | Name : The remote host is missing Sun Security Patch number 114265-23 File : solaris9_x86_114265.nasl - Type : ACT_GATHER_INFO |
2007-10-12 | Name : The remote FreeBSD host is missing a security-related update. File : freebsd_pkg_172acf78780c11dcb3f40016179b2dd5.nasl - Type : ACT_GATHER_INFO |
2007-09-25 | Name : The remote HP-UX host is missing a security-related patch. File : hpux_PHNE_36973.nasl - Type : ACT_GATHER_INFO |
2007-09-25 | Name : The remote host is missing Sun Security Patch number 112837-24 File : solaris9_112837.nasl - Type : ACT_GATHER_INFO |
2004-07-12 | Name : The remote host is missing Sun Security Patch number 109326-24 File : solaris8_109326.nasl - Type : ACT_GATHER_INFO |
2004-07-12 | Name : The remote host is missing Sun Security Patch number 109327-24 File : solaris8_x86_109327.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:37:37 |
|