Executive Summary
Summary | |
---|---|
Title | XFree86 security update |
Informations | |||
---|---|---|---|
Name | RHSA-2008:0029 | First vendor Publication | 2008-01-18 |
Vendor | RedHat | Last vendor Modification | 2008-01-18 |
Severity (Vendor) | Important | Revision | 01 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 9.3 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Problem Description: Updated XFree86 packages that fix several security issues are now available for Red Hat Enterprise Linux 2.1 and 3. This update has been rated as having important security impact by the Red Hat Security Response Team. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - i386, ia64 Red Hat Linux Advanced Workstation 2.1 - ia64 Red Hat Enterprise Linux ES version 2.1 - i386 Red Hat Enterprise Linux WS version 2.1 - i386 Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Desktop version 3 - i386, x86_64 Red Hat Enterprise Linux ES version 3 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64 3. Description: XFree86 is an implementation of the X Window System, which provides the core functionality for the Linux graphical desktop. Two integer overflow flaws were found in the XFree86 server's EVI and MIT-SHM modules. A malicious authorized client could exploit these issues to cause a denial of service (crash), or potentially execute arbitrary code with root privileges on the XFree86 server. (CVE-2007-6429) A heap based buffer overflow flaw was found in the way the XFree86 server handled malformed font files. A malicious local user could exploit this issue to potentially execute arbitrary code with the privileges of the XFree86 server. (CVE-2008-0006) A memory corruption flaw was found in the XFree86 server's XInput extension. A malicious authorized client could exploit this issue to cause a denial of service (crash), or potentially execute arbitrary code with root privileges on the XFree86 server. (CVE-2007-6427) An information disclosure flaw was found in the XFree86 server's TOG-CUP extension. A malicious authorized client could exploit this issue to cause a denial of service (crash), or potentially view arbitrary memory content within the XFree86 server's address space. (CVE-2007-6428) An integer and heap overflow flaw were found in the X.org font server, xfs. A user with the ability to connect to the font server could have been able to cause a denial of service (crash), or potentially execute arbitrary code with the permissions of the font server. (CVE-2007-4568, CVE-2007-4990) A flaw was found in the XFree86 server's XC-SECURITY extension, that could have allowed a local user to verify the existence of an arbitrary file, even in directories that are not normally accessible to that user. (CVE-2007-5958) Users of XFree86 are advised to upgrade to these updated packages, which contain backported patches to resolve these issues. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/FAQ_58_10188 5. Bugs fixed (http://bugzilla.redhat.com/): 281921 - CVE-2007-4568 xfs integer overflow in the build_range function 322961 - CVE-2007-4990 xfs heap overflow in the swap_char2b function 391841 - CVE-2007-5958 Xorg / XFree86 file existence disclosure vulnerability 413721 - CVE-2007-6429 xorg / xfree86: integer overflow in EVI extension 413741 - CVE-2007-6429 xorg / xfree86: integer overflow in MIT-SHM extension 413791 - CVE-2007-6428 xorg / xfree86: information disclosure via TOG-CUP extension 413811 - CVE-2007-6427 xorg / xfree86: memory corruption via XInput extension 428044 - CVE-2008-0006 Xorg / XFree86 PCF font parser buffer overflow |
Original Source
Url : https://rhn.redhat.com/errata/RHSA-2008-0029.html |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
38 % | CWE-189 | Numeric Errors (CWE/SANS Top 25) |
25 % | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
12 % | CWE-787 | Out-of-bounds Write (CWE/SANS Top 25) |
12 % | CWE-362 | Race Condition |
12 % | CWE-200 | Information Exposure |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:17702 | |||
Oval ID: | oval:org.mitre.oval:def:17702 | ||
Title: | USN-571-2 -- xorg-server regression | ||
Description: | USN-571-1 fixed vulnerabilities in X.org. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-571-2 CVE-2007-5760 CVE-2007-6427 CVE-2007-6428 CVE-2007-6429 CVE-2007-5958 CVE-2008-0006 | Version: | 5 |
Platform(s): | Ubuntu 6.06 Ubuntu 6.10 Ubuntu 7.04 Ubuntu 7.10 | Product(s): | xorg-server |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:17768 | |||
Oval ID: | oval:org.mitre.oval:def:17768 | ||
Title: | USN-571-1 -- libxfont, xorg-server vulnerabilities | ||
Description: | Multiple overflows were discovered in the XFree86-Misc, XInput-Misc, TOG-CUP, EVI, and MIT-SHM extensions which did not correctly validate function arguments. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-571-1 CVE-2007-5760 CVE-2007-6427 CVE-2007-6428 CVE-2007-6429 CVE-2007-5958 CVE-2008-0006 | Version: | 5 |
Platform(s): | Ubuntu 6.06 Ubuntu 6.10 Ubuntu 7.04 Ubuntu 7.10 | Product(s): | libxfont xorg-server |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:18113 | |||
Oval ID: | oval:org.mitre.oval:def:18113 | ||
Title: | DSA-1385-1 xfs | ||
Description: | Sean Larsson discovered that two code paths inside the X Font Server handle integer values insecurely, which may lead to the execution of arbitrary code. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-1385-1 CVE-2007-4568 | Version: | 7 |
Platform(s): | Debian GNU/Linux 4.0 | Product(s): | xfs |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:19166 | |||
Oval ID: | oval:org.mitre.oval:def:19166 | ||
Title: | HP-UX Running Xserver, Remote Execution of Arbitrary Code | ||
Description: | Buffer overflow in (1) X.Org Xserver before 1.4.1, and (2) the libfont and libXfont libraries on some platforms including Sun Solaris, allows context-dependent attackers to execute arbitrary code via a PCF font with a large difference between the last col and first col values in the PCF_BDF_ENCODINGS table. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2008-0006 | Version: | 13 |
Platform(s): | HP-UX 11 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:19332 | |||
Oval ID: | oval:org.mitre.oval:def:19332 | ||
Title: | HP-UX Running Xserver, Remote Execution of Arbitrary Code | ||
Description: | Multiple integer overflows in X.Org Xserver before 1.4.1 allow context-dependent attackers to execute arbitrary code via (1) a GetVisualInfo request containing a 32-bit value that is improperly used to calculate an amount of memory for allocation by the EVI extension, or (2) a request containing values related to pixmap size that are improperly used in management of shared memory by the MIT-SHM extension. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2007-6429 | Version: | 13 |
Platform(s): | HP-UX 11 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:19559 | |||
Oval ID: | oval:org.mitre.oval:def:19559 | ||
Title: | HP-UX Running Xserver, Remote Execution of Arbitrary Code | ||
Description: | X.Org Xserver before 1.4.1 allows local users to determine the existence of arbitrary files via a filename argument in the -sp option to the X program, which produces different error messages depending on whether the filename exists. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2007-5958 | Version: | 12 |
Platform(s): | HP-UX 11 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:19689 | |||
Oval ID: | oval:org.mitre.oval:def:19689 | ||
Title: | HP-UX Running Xserver, Remote Execution of Arbitrary Code | ||
Description: | The XInput extension in X.Org Xserver before 1.4.1 allows context-dependent attackers to execute arbitrary code via requests related to byte swapping and heap corruption within multiple functions, a different vulnerability than CVE-2007-4990. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2007-6427 | Version: | 12 |
Platform(s): | HP-UX 11 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:20244 | |||
Oval ID: | oval:org.mitre.oval:def:20244 | ||
Title: | DSA-1466-2 libxfont xfree86 xorg-server - several vulnerabilities | ||
Description: | The X.org fix for <a href="http://security-tracker.debian.org/tracker/CVE-2007-6429">CVE-2007-6429</a> introduced a regression in the MIT-SHM extension, which prevented the start of a few applications. This update provides updated packages for the xfree86 version included in Debian old stable (sarge) in addition to the fixed packages for Debian stable (etch), which were provided in DSA 1466-2. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-1466-2 CVE-2007-5760 CVE-2007-5958 CVE-2007-6427 CVE-2007-6428 CVE-2007-6429 CVE-2008-0006 | Version: | 5 |
Platform(s): | Debian GNU/Linux 4.0 | Product(s): | xorg-server |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:20265 | |||
Oval ID: | oval:org.mitre.oval:def:20265 | ||
Title: | Multiple vulnerabilities in the X server | ||
Description: | The XInput extension in X.Org Xserver before 1.4.1 allows context-dependent attackers to execute arbitrary code via requests related to byte swapping and heap corruption within multiple functions, a different vulnerability than CVE-2007-4990. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2007-6427 | Version: | 4 |
Platform(s): | IBM AIX 6.1 IBM AIX 7.1 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:20793 | |||
Oval ID: | oval:org.mitre.oval:def:20793 | ||
Title: | Multiple vulnerabilities in the X server | ||
Description: | Multiple integer overflows in X.Org Xserver before 1.4.1 allow context-dependent attackers to execute arbitrary code via (1) a GetVisualInfo request containing a 32-bit value that is improperly used to calculate an amount of memory for allocation by the EVI extension, or (2) a request containing values related to pixmap size that are improperly used in management of shared memory by the MIT-SHM extension. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2007-6429 | Version: | 4 |
Platform(s): | IBM AIX 6.1 IBM AIX 7.1 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:22333 | |||
Oval ID: | oval:org.mitre.oval:def:22333 | ||
Title: | ELSA-2008:0031: xorg-x11-server security update (Important) | ||
Description: | Multiple integer overflows in X.Org Xserver before 1.4.1 allow context-dependent attackers to execute arbitrary code via (1) a GetVisualInfo request containing a 32-bit value that is improperly used to calculate an amount of memory for allocation by the EVI extension, or (2) a request containing values related to pixmap size that are improperly used in management of shared memory by the MIT-SHM extension. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2008:0031-02 CVE-2007-5760 CVE-2007-5958 CVE-2007-6427 CVE-2007-6428 CVE-2007-6429 | Version: | 25 |
Platform(s): | Oracle Linux 5 | Product(s): | xorg-x11-server |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:22643 | |||
Oval ID: | oval:org.mitre.oval:def:22643 | ||
Title: | ELSA-2008:0064: libXfont security update (Important) | ||
Description: | Buffer overflow in (1) X.Org Xserver before 1.4.1, and (2) the libfont and libXfont libraries on some platforms including Sun Solaris, allows context-dependent attackers to execute arbitrary code via a PCF font with a large difference between the last col and first col values in the PCF_BDF_ENCODINGS table. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2008:0064-01 CVE-2008-0006 | Version: | 6 |
Platform(s): | Oracle Linux 5 | Product(s): | libXfont |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:5393 | |||
Oval ID: | oval:org.mitre.oval:def:5393 | ||
Title: | Security Vulnerability in the Solaris X Server May Lead to Unauthorized Disclosure of Information on Access Restricted Files and Directories | ||
Description: | X.Org Xserver before 1.4.1 allows local users to determine the existence of arbitrary files via a filename argument in the -sp option to the X program, which produces different error messages depending on whether the filename exists. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2007-5958 | Version: | 1 |
Platform(s): | Sun Solaris 8 Sun Solaris 9 Sun Solaris 10 | Product(s): | |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
ExploitDB Exploits
id | Description |
---|---|
2008-02-19 | X.Org xorg-server <= 1.1.1-48.13 - Probe for Files Exploit PoC |
OpenVAS Exploits
Date | Description |
---|---|
2010-05-12 | Name : Mac OS X 10.5.2 Update / Mac OS X Security Update 2008-001 File : nvt/macosx_upd_10_5_2_secupd_2008-001.nasl |
2009-11-17 | Name : Mac OS X Version File : nvt/macosx_version.nasl |
2009-10-10 | Name : SLES9: Security update for XFree86-libs File : nvt/sles9p5020914.nasl |
2009-10-10 | Name : SLES9: Security update for XFree86-Xnest File : nvt/sles9p5012483.nasl |
2009-05-05 | Name : HP-UX Update for X Font Server (xfs) Software HPSBUX02303 File : nvt/gb_hp_ux_HPSBUX02303.nasl |
2009-05-05 | Name : HP-UX Update for Xserver HPSBUX02381 File : nvt/gb_hp_ux_HPSBUX02381.nasl |
2009-04-09 | Name : Mandriva Update for x11-server-xgl MDVSA-2008:025 (x11-server-xgl) File : nvt/gb_mandriva_MDVSA_2008_025.nasl |
2009-04-09 | Name : Mandriva Update for libxfont MDVSA-2008:024 (libxfont) File : nvt/gb_mandriva_MDVSA_2008_024.nasl |
2009-04-09 | Name : Mandriva Update for x11-server MDVSA-2008:023 (x11-server) File : nvt/gb_mandriva_MDVSA_2008_023.nasl |
2009-04-09 | Name : Mandriva Update for xfs MDKSA-2007:210 (xfs) File : nvt/gb_mandriva_MDKSA_2007_210.nasl |
2009-03-23 | Name : Ubuntu Update for xorg-server regression USN-571-2 File : nvt/gb_ubuntu_USN_571_2.nasl |
2009-03-23 | Name : Ubuntu Update for libxfont, xorg-server vulnerabilities USN-571-1 File : nvt/gb_ubuntu_USN_571_1.nasl |
2009-03-06 | Name : RedHat Update for XFree86 RHSA-2008:0029-01 File : nvt/gb_RHSA-2008_0029-01_XFree86.nasl |
2009-03-06 | Name : RedHat Update for xorg-x11 RHSA-2008:0030-01 File : nvt/gb_RHSA-2008_0030-01_xorg-x11.nasl |
2009-03-06 | Name : RedHat Update for xorg-x11-server RHSA-2008:0031-01 File : nvt/gb_RHSA-2008_0031-01_xorg-x11-server.nasl |
2009-03-06 | Name : RedHat Update for libXfont RHSA-2008:0064-01 File : nvt/gb_RHSA-2008_0064-01_libXfont.nasl |
2009-02-27 | Name : CentOS Update for xorg-x11 CESA-2008:0030 centos4 x86_64 File : nvt/gb_CESA-2008_0030_xorg-x11_centos4_x86_64.nasl |
2009-02-27 | Name : CentOS Update for XFree86 CESA-2008:0029-01 centos2 i386 File : nvt/gb_CESA-2008_0029-01_XFree86_centos2_i386.nasl |
2009-02-27 | Name : CentOS Update for XFree86-100dpi-fonts CESA-2008:0029 centos3 i386 File : nvt/gb_CESA-2008_0029_XFree86-100dpi-fonts_centos3_i386.nasl |
2009-02-27 | Name : CentOS Update for XFree86-100dpi-fonts CESA-2008:0029 centos3 x86_64 File : nvt/gb_CESA-2008_0029_XFree86-100dpi-fonts_centos3_x86_64.nasl |
2009-02-27 | Name : Fedora Update for xorg-x11-xfs FEDORA-2007-4263 File : nvt/gb_fedora_2007_4263_xorg-x11-xfs_fc7.nasl |
2009-02-27 | Name : CentOS Update for xorg-x11 CESA-2008:0030 centos4 i386 File : nvt/gb_CESA-2008_0030_xorg-x11_centos4_i386.nasl |
2009-02-17 | Name : Fedora Update for libXfont FEDORA-2008-0891 File : nvt/gb_fedora_2008_0891_libXfont_fc7.nasl |
2009-02-17 | Name : Fedora Update for xorg-x11-server FEDORA-2008-0831 File : nvt/gb_fedora_2008_0831_xorg-x11-server_fc7.nasl |
2009-02-17 | Name : Fedora Update for libXfont FEDORA-2008-0794 File : nvt/gb_fedora_2008_0794_libXfont_fc8.nasl |
2009-02-17 | Name : Fedora Update for xorg-x11-server FEDORA-2008-0760 File : nvt/gb_fedora_2008_0760_xorg-x11-server_fc8.nasl |
2009-01-28 | Name : SuSE Update for XOrg SUSE-SA:2007:054 File : nvt/gb_suse_2007_054.nasl |
2009-01-23 | Name : SuSE Update for Xorg and XFree SUSE-SA:2008:003 File : nvt/gb_suse_2008_003.nasl |
2008-09-24 | Name : Gentoo Security Advisory GLSA 200710-11 (xfs) File : nvt/glsa_200710_11.nasl |
2008-09-24 | Name : Gentoo Security Advisory GLSA 200801-09 (xorg-server libXfont) File : nvt/glsa_200801_09.nasl |
2008-09-24 | Name : Gentoo Security Advisory GLSA 200804-05 (nx, nxnode) File : nvt/glsa_200804_05.nasl |
2008-09-24 | Name : Gentoo Security Advisory GLSA 200805-07 (ltsp) File : nvt/glsa_200805_07.nasl |
2008-09-04 | Name : FreeBSD Ports: xorg-server File : nvt/freebsd_xorg-server0.nasl |
2008-09-04 | Name : FreeBSD Ports: xfs File : nvt/freebsd_xfs.nasl |
2008-01-31 | Name : Debian Security Advisory DSA 1466-2 (xorg-server, libxfont, xfree86) File : nvt/deb_1466_2.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
40943 | X.Org Xserver X Program -sp Parameter Local File Enumeration |
40942 | X.Org Xserver XInput Extension Multiple Function Arbitrary Code Execution |
40941 | X.Org Xserver TOG-CUP Extension ProcGetReservedColormapEntries Function Arbit... |
40940 | X.Org Xserver MIT-SHM Extension Crafted Request Arbitrary Code Execution |
40939 | X.Org Xserver Crafted GetVisualInfo Request Arbitrary Code Execution |
40938 | X.Org Xserver PCF Font Handling Arbitrary Code Execution |
37722 | X.Org X Font Server (xfs) swap_char2b Function Arbitrary Code Execution |
37721 | X.Org X Font Server (xfs) build_range Function Overflow |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | X.org PCF parsing buffer overflow attempt RuleID : 16070 - Revision : 9 - Type : FILE-OTHER |
2014-01-10 | X.Org X Font Server QueryXBitmaps and QueryXExtents Handlers integer overflow... RuleID : 15382 - Revision : 10 - Type : SERVER-OTHER |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2008-0064.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2008-0031.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2008-0030.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2008-0029.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20080118_XFree86_on_SL3.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20080117_xorg_x11_server_on_SL5_x.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20080117_xorg_x11_on_SL4_x.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20080117_libXfont_on_SL5_x.nasl - Type : ACT_GATHER_INFO |
2010-01-06 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2008-0030.nasl - Type : ACT_GATHER_INFO |
2010-01-06 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2008-0031.nasl - Type : ACT_GATHER_INFO |
2010-01-06 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2008-0064.nasl - Type : ACT_GATHER_INFO |
2009-09-24 | Name : The remote SuSE 9 host is missing a security-related patch. File : suse9_12043.nasl - Type : ACT_GATHER_INFO |
2009-09-24 | Name : The remote SuSE 9 host is missing a security-related patch. File : suse9_12040.nasl - Type : ACT_GATHER_INFO |
2009-04-23 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2008-024.nasl - Type : ACT_GATHER_INFO |
2009-04-23 | Name : The remote Mandriva Linux host is missing a security update. File : mandriva_MDVSA-2008-025.nasl - Type : ACT_GATHER_INFO |
2009-04-23 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2008-023.nasl - Type : ACT_GATHER_INFO |
2008-11-11 | Name : The remote HP-UX host is missing a security-related patch. File : hpux_PHSS_37972.nasl - Type : ACT_GATHER_INFO |
2008-11-11 | Name : The remote HP-UX host is missing a security-related patch. File : hpux_PHSS_38840.nasl - Type : ACT_GATHER_INFO |
2008-11-11 | Name : The remote HP-UX host is missing a security-related patch. File : hpux_PHSS_34392.nasl - Type : ACT_GATHER_INFO |
2008-04-04 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_xgl-5100.nasl - Type : ACT_GATHER_INFO |
2008-04-04 | Name : The remote openSUSE host is missing a security update. File : suse_xgl-5099.nasl - Type : ACT_GATHER_INFO |
2008-03-19 | Name : The remote host is missing a Mac OS X update that fixes various security issues. File : macosx_SecUpd2008-002.nasl - Type : ACT_GATHER_INFO |
2008-02-12 | Name : The remote host is missing a Mac OS X update that fixes various security issues. File : macosx_10_5_2.nasl - Type : ACT_GATHER_INFO |
2008-02-12 | Name : The remote host is missing a Mac OS X update that fixes various security issues. File : macosx_SecUpd2008-001.nasl - Type : ACT_GATHER_INFO |
2008-01-29 | Name : The remote openSUSE host is missing a security update. File : suse_NX-4952.nasl - Type : ACT_GATHER_INFO |
2008-01-27 | Name : The remote Fedora host is missing a security update. File : fedora_2008-0831.nasl - Type : ACT_GATHER_INFO |
2008-01-27 | Name : The remote Fedora host is missing a security update. File : fedora_2008-0794.nasl - Type : ACT_GATHER_INFO |
2008-01-27 | Name : The remote Fedora host is missing a security update. File : fedora_2008-0760.nasl - Type : ACT_GATHER_INFO |
2008-01-27 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-1466.nasl - Type : ACT_GATHER_INFO |
2008-01-27 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_fe2b6597c9a411dc8da80008a18a9961.nasl - Type : ACT_GATHER_INFO |
2008-01-27 | Name : The remote Fedora host is missing a security update. File : fedora_2008-0891.nasl - Type : ACT_GATHER_INFO |
2008-01-22 | Name : The remote HP-UX host is missing a security-related patch. File : hpux_PHSS_37225.nasl - Type : ACT_GATHER_INFO |
2008-01-22 | Name : The remote HP-UX host is missing a security-related patch. File : hpux_PHSS_37224.nasl - Type : ACT_GATHER_INFO |
2008-01-22 | Name : The remote HP-UX host is missing a security-related patch. File : hpux_PHSS_37226.nasl - Type : ACT_GATHER_INFO |
2008-01-21 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_xorg-x11-Xnest-4875.nasl - Type : ACT_GATHER_INFO |
2008-01-21 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_xorg-x11-libs-4860.nasl - Type : ACT_GATHER_INFO |
2008-01-21 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-571-2.nasl - Type : ACT_GATHER_INFO |
2008-01-21 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-200801-09.nasl - Type : ACT_GATHER_INFO |
2008-01-21 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2008-0029.nasl - Type : ACT_GATHER_INFO |
2008-01-18 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2008-0064.nasl - Type : ACT_GATHER_INFO |
2008-01-18 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2008-0031.nasl - Type : ACT_GATHER_INFO |
2008-01-18 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2008-0030.nasl - Type : ACT_GATHER_INFO |
2008-01-18 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2008-0029.nasl - Type : ACT_GATHER_INFO |
2008-01-18 | Name : The remote openSUSE host is missing a security update. File : suse_xorg-x11-Xnest-4859.nasl - Type : ACT_GATHER_INFO |
2008-01-18 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-571-1.nasl - Type : ACT_GATHER_INFO |
2007-12-13 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_xorg-x11-4485.nasl - Type : ACT_GATHER_INFO |
2007-12-11 | Name : The remote Fedora host is missing a security update. File : fedora_2007-4263.nasl - Type : ACT_GATHER_INFO |
2007-11-07 | Name : The remote Mandrake Linux host is missing a security update. File : mandrake_MDKSA-2007-210.nasl - Type : ACT_GATHER_INFO |
2007-10-15 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-200710-11.nasl - Type : ACT_GATHER_INFO |
2007-10-12 | Name : The remote host is missing Sun Security Patch number 125719-58 File : solaris10_125719.nasl - Type : ACT_GATHER_INFO |
2007-10-12 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-1385.nasl - Type : ACT_GATHER_INFO |
2007-10-09 | Name : The remote FreeBSD host is missing a security-related update. File : freebsd_pkg_a5f667db759611dc8b7a0019b944b34e.nasl - Type : ACT_GATHER_INFO |
2006-11-06 | Name : The remote host is missing Sun Security Patch number 118908-06 File : solaris9_x86_118908.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:51:21 |
|