Executive Summary
Summary | |
---|---|
Title | GNU C Library vulnerability |
Informations | |||
---|---|---|---|
Name | USN-1009-2 | First vendor Publication | 2011-01-12 |
Vendor | Ubuntu | Last vendor Modification | 2011-01-12 |
Severity (Vendor) | N/A | Revision | N/A |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:L/AC:L/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 7.2 | Attack Range | Local |
Cvss Impact Score | 10 | Attack Complexity | Low |
Cvss Expoit Score | 3.9 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
A security issue affects the following Ubuntu releases: Ubuntu 8.04 LTS Ubuntu 9.10 Ubuntu 10.04 LTS Ubuntu 10.10 This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 8.04 LTS: Ubuntu 9.10: Ubuntu 10.04 LTS: Ubuntu 10.10: In general, a standard system update will make all the necessary changes. Details follow: USN-1009-1 fixed vulnerabilities in the GNU C library. Colin Watson discovered that the fixes were incomplete and introduced flaws with setuid programs loading libraries that used dynamic string tokens in their RPATH. If the "man" program was installed setuid, a local attacker could exploit this to gain "man" user privileges, potentially leading to further privilege escalations. Default Ubuntu installations were not affected. Original advisory details: Tavis Ormandy discovered multiple flaws in the GNU C Library's handling |
Original Source
Url : http://www.ubuntu.com/usn/USN-1009-2 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
50 % | CWE-264 | Permissions, Privileges, and Access Controls |
50 % | CWE-59 | Improper Link Resolution Before File Access ('Link Following') |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:12604 | |||
Oval ID: | oval:org.mitre.oval:def:12604 | ||
Title: | DSA-2122-1 glibc -- missing input sanitisation | ||
Description: | Ben Hawkes and Tavis Ormandy discovered that the dynamic loader in GNU libc allows local users to gain root privileges using a crafted LD_AUDIT environment variable. For the stable distribution, this problem has been fixed in version 2.7-18lenny6. For the upcoming stable distribution, this problem has been fixed in version 2.11.2-6+squeeze1 of the eglibc package. For the unstable distribution, this problem will be fixed soon. We recommend that you upgrade your glibc packages. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-2122-1 CVE-2010-3847 CVE-2010-3856 | Version: | 5 |
Platform(s): | Debian GNU/Linux 5.0 | Product(s): | glibc |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:12802 | |||
Oval ID: | oval:org.mitre.oval:def:12802 | ||
Title: | DSA-2122-2 glibc -- missing input sanitisation | ||
Description: | Colin Watson discovered that the update for stable relased in DSA-2122-1 did not complete address the underlying security issue in all possible scenarios. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-2122-2 CVE-2010-3847 CVE-2010-3856 | Version: | 5 |
Platform(s): | Debian GNU/Linux 5.0 | Product(s): | glibc |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:13086 | |||
Oval ID: | oval:org.mitre.oval:def:13086 | ||
Title: | VMSA-2011-0010 VMware ESX third party updates for Service Console packages glibc and dhcp | ||
Description: | Multiple untrusted search path vulnerabilities in elf/dl-object.c in certain modified versions of the GNU C Library (aka glibc or libc6), including glibc-2.5-49.el5_5.6 and glibc-2.12-1.7.el6_0.3 in Red Hat Enterprise Linux, allow local users to gain privileges via a crafted dynamic shared object (DSO) in a subdirectory of the current working directory during execution of a (1) setuid or (2) setgid program that has $ORIGIN in (a) RPATH or (b) RUNPATH within the program itself or a referenced library. NOTE: this issue exists because of an incorrect fix for CVE-2010-3847. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2011-0536 | Version: | 4 |
Platform(s): | VMWare ESX Server 4.1 | Product(s): | |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:19613 | |||
Oval ID: | oval:org.mitre.oval:def:19613 | ||
Title: | VMware ESX third party updates for Service Console packages glibc and dhcp | ||
Description: | Multiple untrusted search path vulnerabilities in elf/dl-object.c in certain modified versions of the GNU C Library (aka glibc or libc6), including glibc-2.5-49.el5_5.6 and glibc-2.12-1.7.el6_0.3 in Red Hat Enterprise Linux, allow local users to gain privileges via a crafted dynamic shared object (DSO) in a subdirectory of the current working directory during execution of a (1) setuid or (2) setgid program that has $ORIGIN in (a) RPATH or (b) RUNPATH within the program itself or a referenced library. NOTE: this issue exists because of an incorrect fix for CVE-2010-3847. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2011-0536 | Version: | 4 |
Platform(s): | VMWare ESX Server 4.1 VMWare ESX Server 4.0 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:19654 | |||
Oval ID: | oval:org.mitre.oval:def:19654 | ||
Title: | VMware ESX third party updates for Service Console packages glibc and dhcp | ||
Description: | Multiple untrusted search path vulnerabilities in elf/dl-object.c in certain modified versions of the GNU C Library (aka glibc or libc6), including glibc-2.5-49.el5_5.6 and glibc-2.12-1.7.el6_0.3 in Red Hat Enterprise Linux, allow local users to gain privileges via a crafted dynamic shared object (DSO) in a subdirectory of the current working directory during execution of a (1) setuid or (2) setgid program that has $ORIGIN in (a) RPATH or (b) RUNPATH within the program itself or a referenced library. NOTE: this issue exists because of an incorrect fix for CVE-2010-3847. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2011-0536 | Version: | 4 |
Platform(s): | VMWare ESX Server 4.1 VMWare ESX Server 4.0 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:19821 | |||
Oval ID: | oval:org.mitre.oval:def:19821 | ||
Title: | VMware ESX third party updates for Service Console packages glibc, sudo, and openldap | ||
Description: | elf/dl-load.c in ld.so in the GNU C Library (aka glibc or libc6) through 2.11.2, and 2.12.x through 2.12.1, does not properly handle a value of $ORIGIN for the LD_AUDIT environment variable, which allows local users to gain privileges via a crafted dynamic shared object (DSO) located in an arbitrary directory. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2010-3847 | Version: | 4 |
Platform(s): | VMWare ESX Server 4.1 VMWare ESX Server 4.0 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:20315 | |||
Oval ID: | oval:org.mitre.oval:def:20315 | ||
Title: | VMware ESX third party updates for Service Console packages glibc, sudo, and openldap | ||
Description: | ld.so in the GNU C Library (aka glibc or libc6) before 2.11.3, and 2.12.x before 2.12.2, does not properly restrict use of the LD_AUDIT environment variable to reference dynamic shared objects (DSOs) as audit objects, which allows local users to gain privileges by leveraging an unsafe DSO located in a trusted library directory, as demonstrated by libpcprofile.so. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2010-3856 | Version: | 4 |
Platform(s): | VMWare ESX Server 4.1 VMWare ESX Server 4.0 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:21997 | |||
Oval ID: | oval:org.mitre.oval:def:21997 | ||
Title: | RHSA-2010:0793: glibc security update (Important) | ||
Description: | ld.so in the GNU C Library (aka glibc or libc6) before 2.11.3, and 2.12.x before 2.12.2, does not properly restrict use of the LD_AUDIT environment variable to reference dynamic shared objects (DSOs) as audit objects, which allows local users to gain privileges by leveraging an unsafe DSO located in a trusted library directory, as demonstrated by libpcprofile.so. | ||
Family: | unix | Class: | patch |
Reference(s): | RHSA-2010:0793-01 CESA-2010:0793 CVE-2010-3856 | Version: | 4 |
Platform(s): | Red Hat Enterprise Linux 5 CentOS Linux 5 | Product(s): | glibc |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:22199 | |||
Oval ID: | oval:org.mitre.oval:def:22199 | ||
Title: | RHSA-2010:0787: glibc security update (Important) | ||
Description: | elf/dl-load.c in ld.so in the GNU C Library (aka glibc or libc6) through 2.11.2, and 2.12.x through 2.12.1, does not properly handle a value of $ORIGIN for the LD_AUDIT environment variable, which allows local users to gain privileges via a crafted dynamic shared object (DSO) located in an arbitrary directory. | ||
Family: | unix | Class: | patch |
Reference(s): | RHSA-2010:0787-01 CESA-2010:0787 CVE-2010-3847 | Version: | 4 |
Platform(s): | Red Hat Enterprise Linux 5 CentOS Linux 5 | Product(s): | glibc |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:22327 | |||
Oval ID: | oval:org.mitre.oval:def:22327 | ||
Title: | RHSA-2010:0872: glibc security and bug fix update (Important) | ||
Description: | ld.so in the GNU C Library (aka glibc or libc6) before 2.11.3, and 2.12.x before 2.12.2, does not properly restrict use of the LD_AUDIT environment variable to reference dynamic shared objects (DSOs) as audit objects, which allows local users to gain privileges by leveraging an unsafe DSO located in a trusted library directory, as demonstrated by libpcprofile.so. | ||
Family: | unix | Class: | patch |
Reference(s): | RHSA-2010:0872-02 CVE-2010-3847 CVE-2010-3856 | Version: | 29 |
Platform(s): | Red Hat Enterprise Linux 6 | Product(s): | glibc |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:22846 | |||
Oval ID: | oval:org.mitre.oval:def:22846 | ||
Title: | ELSA-2010:0793: glibc security update (Important) | ||
Description: | ld.so in the GNU C Library (aka glibc or libc6) before 2.11.3, and 2.12.x before 2.12.2, does not properly restrict use of the LD_AUDIT environment variable to reference dynamic shared objects (DSOs) as audit objects, which allows local users to gain privileges by leveraging an unsafe DSO located in a trusted library directory, as demonstrated by libpcprofile.so. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2010:0793-01 CVE-2010-3856 | Version: | 6 |
Platform(s): | Oracle Linux 5 | Product(s): | glibc |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:23012 | |||
Oval ID: | oval:org.mitre.oval:def:23012 | ||
Title: | ELSA-2010:0787: glibc security update (Important) | ||
Description: | elf/dl-load.c in ld.so in the GNU C Library (aka glibc or libc6) through 2.11.2, and 2.12.x through 2.12.1, does not properly handle a value of $ORIGIN for the LD_AUDIT environment variable, which allows local users to gain privileges via a crafted dynamic shared object (DSO) located in an arbitrary directory. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2010:0787-01 CVE-2010-3847 | Version: | 6 |
Platform(s): | Oracle Linux 5 | Product(s): | glibc |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:23540 | |||
Oval ID: | oval:org.mitre.oval:def:23540 | ||
Title: | ELSA-2010:0872: glibc security and bug fix update (Important) | ||
Description: | ld.so in the GNU C Library (aka glibc or libc6) before 2.11.3, and 2.12.x before 2.12.2, does not properly restrict use of the LD_AUDIT environment variable to reference dynamic shared objects (DSOs) as audit objects, which allows local users to gain privileges by leveraging an unsafe DSO located in a trusted library directory, as demonstrated by libpcprofile.so. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2010:0872-02 CVE-2010-3847 CVE-2010-3856 | Version: | 13 |
Platform(s): | Oracle Linux 6 | Product(s): | glibc |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:27665 | |||
Oval ID: | oval:org.mitre.oval:def:27665 | ||
Title: | DEPRECATED: ELSA-2010-0787 -- glibc security update (important) | ||
Description: | [2.5-49.el5_5.6] - Never expand in privileged programs (#643818, CVE-2010-3847) | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2010-0787 CVE-2010-3847 | Version: | 4 |
Platform(s): | Oracle Linux 5 | Product(s): | glibc |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:27803 | |||
Oval ID: | oval:org.mitre.oval:def:27803 | ||
Title: | DEPRECATED: ELSA-2010-0872 -- glibc security and bug fix update (important) | ||
Description: | [2.12-1.7.el6_0.3] - Require suid bit on audit objects in privileged programs (#645679, CVE-2010-3856) [2.12-1.7.el6_0.2] - Never expand in privileged programs (#643821) [2.12-1.7.el6_0.1] - Fix bug in generic strstr/memmem implementation handling certain repeated patterns (#643341) - Correctly align TCB for AVX (#643343) | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2010-0872 CVE-2010-3847 CVE-2010-3856 | Version: | 4 |
Platform(s): | Oracle Linux 6 | Product(s): | glibc |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:28160 | |||
Oval ID: | oval:org.mitre.oval:def:28160 | ||
Title: | DEPRECATED: ELSA-2010-0793 -- glibc security update (important) | ||
Description: | [2.5-49.el5_5.7] - Require suid bit on audit objects in privileged programs (#645677, CVE-2010-3856) | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2010-0793 CVE-2010-3856 | Version: | 4 |
Platform(s): | Oracle Linux 5 | Product(s): | glibc |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
ExploitDB Exploits
id | Description |
---|---|
2011-11-10 | glibc LD_AUDIT arbitrary DSO load Privilege Escalation |
2010-10-22 | GNU C library dynamic linker LD_AUDIT arbitrary DSO load Vulnerability |
2010-10-18 | GNU C library dynamic linker $ORIGIN expansion Vulnerability |
OpenVAS Exploits
Date | Description |
---|---|
2012-07-30 | Name : CentOS Update for glibc CESA-2011:0412 centos5 x86_64 File : nvt/gb_CESA-2011_0412_glibc_centos5_x86_64.nasl |
2012-06-06 | Name : RedHat Update for glibc RHSA-2011:0413-01 File : nvt/gb_RHSA-2011_0413-01_glibc.nasl |
2012-03-16 | Name : VMSA-2011-0012.3 VMware ESXi and ESX updates to third party libraries and ESX... File : nvt/gb_VMSA-2011-0012.nasl |
2011-11-28 | Name : Mandriva Update for glibc MDVSA-2011:178 (glibc) File : nvt/gb_mandriva_MDVSA_2011_178.nasl |
2011-08-09 | Name : CentOS Update for glibc CESA-2010:0787 centos5 i386 File : nvt/gb_CESA-2010_0787_glibc_centos5_i386.nasl |
2011-08-09 | Name : CentOS Update for glibc CESA-2010:0793 centos5 i386 File : nvt/gb_CESA-2010_0793_glibc_centos5_i386.nasl |
2011-08-09 | Name : CentOS Update for glibc CESA-2011:0412 centos5 i386 File : nvt/gb_CESA-2011_0412_glibc_centos5_i386.nasl |
2011-04-06 | Name : RedHat Update for glibc RHSA-2011:0412-01 File : nvt/gb_RHSA-2011_0412-01_glibc.nasl |
2011-03-09 | Name : Gentoo Security Advisory GLSA 201011-01 (glibc) File : nvt/glsa_201011_01.nasl |
2011-03-07 | Name : Debian Security Advisory DSA 2122-2 (glibc) File : nvt/deb_2122_2.nasl |
2011-01-14 | Name : Ubuntu Update for eglibc, glibc vulnerability USN-1009-2 File : nvt/gb_ubuntu_USN_1009_2.nasl |
2010-12-02 | Name : Fedora Update for glibc FEDORA-2010-16308 File : nvt/gb_fedora_2010_16308_glibc_fc14.nasl |
2010-12-02 | Name : Fedora Update for glibc FEDORA-2010-16851 File : nvt/gb_fedora_2010_16851_glibc_fc14.nasl |
2010-11-17 | Name : Debian Security Advisory DSA 2122-1 (glibc) File : nvt/deb_2122_1.nasl |
2010-11-16 | Name : Fedora Update for glibc FEDORA-2010-16641 File : nvt/gb_fedora_2010_16641_glibc_fc12.nasl |
2010-11-16 | Name : SuSE Update for glibc SUSE-SA:2010:052 File : nvt/gb_suse_2010_052.nasl |
2010-11-04 | Name : RedHat Update for glibc RHSA-2010:0793-01 File : nvt/gb_RHSA-2010_0793-01_glibc.nasl |
2010-11-04 | Name : Fedora Update for glibc FEDORA-2010-16655 File : nvt/gb_fedora_2010_16655_glibc_fc13.nasl |
2010-10-26 | Name : Fedora Update for glibc FEDORA-2010-16594 File : nvt/gb_fedora_2010_16594_glibc_fc13.nasl |
2010-10-26 | Name : Mandriva Update for glibc MDVSA-2010:212 (glibc) File : nvt/gb_mandriva_MDVSA_2010_212.nasl |
2010-10-26 | Name : Ubuntu Update for glibc, eglibc vulnerabilities USN-1009-1 File : nvt/gb_ubuntu_USN_1009_1.nasl |
2010-10-22 | Name : RedHat Update for glibc RHSA-2010:0787-01 File : nvt/gb_RHSA-2010_0787-01_glibc.nasl |
2010-10-22 | Name : Mandriva Update for glibc MDVSA-2010:207 (glibc) File : nvt/gb_mandriva_MDVSA_2010_207.nasl |
0000-00-00 | Name : Slackware Advisory SSA:2010-301-01 glibc File : nvt/esoft_slk_ssa_2010_301_01.nasl |
0000-00-00 | Name : Slackware Advisory SSA:2010-295-01 glibc File : nvt/esoft_slk_ssa_2010_295_01.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
68920 | GNU C Library Dynamic Linker LD_AUDIT non-setuid Library Loading Issue GNU C Library contains a flaw related to 'ld.so' failing to properly restrict use of the LD_AUDIT environment variable to reference dynamic shared objects as audit objects. This may allow a local attacker to gain elevated privileges via an unsafe DSO located in a trusted library directory. |
68721 | GNU C Library Dynamic Linker $ORIGIN Substitution Expansion Weakness Local Pr... The weakness is caused due to dynamic linker expanding the "$ORIGIN" substitution for privileged applications, which can be exploited to gain escalated privileges by e.g. hard linking to a setuid application and forcing the expansion of "$ORIGIN" via "LD_AUDIT". |
Information Assurance Vulnerability Management (IAVM)
Date | Description |
---|---|
2011-10-27 | IAVM : 2011-A-0147 - Multiple Vulnerabilities in VMware ESX and ESXi Severity : Category I - VMSKEY : V0030545 |
2011-08-04 | IAVM : 2011-A-0108 - Multiple Vulnerabilities in VMware ESX Service Console Severity : Category I - VMSKEY : V0029562 |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2016-03-04 | Name : The remote VMware ESX / ESXi host is missing a security-related patch. File : vmware_VMSA-2011-0012_remote.nasl - Type : ACT_GATHER_INFO |
2016-03-04 | Name : The remote VMware ESX host is missing a security-related patch. File : vmware_VMSA-2011-0010_remote.nasl - Type : ACT_GATHER_INFO |
2016-03-04 | Name : The remote VMware ESX host is missing a security-related patch. File : vmware_VMSA-2011-0001_remote.nasl - Type : ACT_GATHER_INFO |
2015-02-02 | Name : The remote OracleVM host is missing one or more security updates. File : oraclevm_OVMSA-2015-0023.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : suse_11_3_glibc-101027.nasl - Type : ACT_GATHER_INFO |
2013-12-03 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201312-01.nasl - Type : ACT_GATHER_INFO |
2013-11-13 | Name : The remote VMware ESXi 5.0 host is affected by multiple security vulnerabilit... File : vmware_esxi_5_0_build_515841_remote.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2011-0413.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2011-0412.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2010-0872.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2010-0793.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2010-0787.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20101020_glibc_on_SL5_x.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20101110_glibc_on_SL6_x.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20110404_glibc_on_SL5_x.nasl - Type : ACT_GATHER_INFO |
2011-12-13 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_glibc-110517.nasl - Type : ACT_GATHER_INFO |
2011-12-13 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_glibc-7574.nasl - Type : ACT_GATHER_INFO |
2011-11-28 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2011-178.nasl - Type : ACT_GATHER_INFO |
2011-10-14 | Name : The remote VMware ESXi / ESX host is missing one or more security-related pat... File : vmware_VMSA-2011-0012.nasl - Type : ACT_GATHER_INFO |
2011-08-01 | Name : The remote VMware ESX host is missing one or more security-related patches. File : vmware_VMSA-2011-0010.nasl - Type : ACT_GATHER_INFO |
2011-06-28 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_glibc-110516.nasl - Type : ACT_GATHER_INFO |
2011-06-28 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_glibc-7575.nasl - Type : ACT_GATHER_INFO |
2011-06-28 | Name : The remote SuSE 9 host is missing a security-related patch. File : suse9_12775.nasl - Type : ACT_GATHER_INFO |
2011-04-15 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2011-0412.nasl - Type : ACT_GATHER_INFO |
2011-04-05 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2011-0412.nasl - Type : ACT_GATHER_INFO |
2011-04-05 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2011-0413.nasl - Type : ACT_GATHER_INFO |
2011-01-12 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1009-2.nasl - Type : ACT_GATHER_INFO |
2011-01-06 | Name : The remote VMware ESX host is missing one or more security-related patches. File : vmware_VMSA-2011-0001.nasl - Type : ACT_GATHER_INFO |
2010-12-02 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_glibc-101025.nasl - Type : ACT_GATHER_INFO |
2010-11-24 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2010-0787.nasl - Type : ACT_GATHER_INFO |
2010-11-24 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2010-0793.nasl - Type : ACT_GATHER_INFO |
2010-11-18 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2010-0872.nasl - Type : ACT_GATHER_INFO |
2010-11-16 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201011-01.nasl - Type : ACT_GATHER_INFO |
2010-11-01 | Name : The remote Fedora host is missing a security update. File : fedora_2010-16641.nasl - Type : ACT_GATHER_INFO |
2010-10-29 | Name : The remote Fedora host is missing a security update. File : fedora_2010-16851.nasl - Type : ACT_GATHER_INFO |
2010-10-29 | Name : The remote Slackware host is missing a security update. File : Slackware_SSA_2010-301-01.nasl - Type : ACT_GATHER_INFO |
2010-10-29 | Name : The remote Fedora host is missing a security update. File : fedora_2010-16655.nasl - Type : ACT_GATHER_INFO |
2010-10-28 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_glibc-7201.nasl - Type : ACT_GATHER_INFO |
2010-10-28 | Name : The remote openSUSE host is missing a security update. File : suse_11_2_glibc-101027.nasl - Type : ACT_GATHER_INFO |
2010-10-28 | Name : The remote openSUSE host is missing a security update. File : suse_11_1_glibc-101026.nasl - Type : ACT_GATHER_INFO |
2010-10-26 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2010-0793.nasl - Type : ACT_GATHER_INFO |
2010-10-25 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2010-212.nasl - Type : ACT_GATHER_INFO |
2010-10-24 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-1009-1.nasl - Type : ACT_GATHER_INFO |
2010-10-24 | Name : The remote Fedora host is missing a security update. File : fedora_2010-16594.nasl - Type : ACT_GATHER_INFO |
2010-10-24 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2122.nasl - Type : ACT_GATHER_INFO |
2010-10-24 | Name : The remote Slackware host is missing a security update. File : Slackware_SSA_2010-295-01.nasl - Type : ACT_GATHER_INFO |
2010-10-21 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2010-207.nasl - Type : ACT_GATHER_INFO |
2010-10-21 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2010-0787.nasl - Type : ACT_GATHER_INFO |
2010-10-20 | Name : The remote Fedora host is missing a security update. File : fedora_2010-16308.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:58:01 |
|
2013-05-11 00:54:01 |
|