Куда я попал?
SECURITM это SGRC система, ? автоматизирующая процессы в службах информационной безопасности. SECURITM помогает построить и управлять ИСПДн, КИИ, ГИС, СМИБ/СУИБ, банковскими системами защиты.
А еще SECURITM это место для обмена опытом и наработками для служб безопасности.

CVE-2009-0792

PUBLISHED 07.08.2024

CNA: redhat

Обновлено: 10.10.2018
Multiple integer overflows in icc.c in the International Color Consortium (ICC) Format library (aka icclib), as used in Ghostscript 8.64 and earlier and Argyll Color Management System (CMS) 1.0.3 and earlier, allow context-dependent attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly execute arbitrary code by using a device file for a translation request that operates on a crafted image file and targets a certain "native color space," related to an ICC profile in a (1) PostScript or (2) PDF file with embedded images. NOTE: this issue exists because of an incomplete fix for CVE-2009-0583.

БДУ ФСТЭК

Идентификатор Описание
BDU:2015-06205 Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

Доп. Информация

Product Status

n/a
Product: n/a
Vendor: n/a
Default status: Не определен
Версии:
Затронутые версии Статус
Наблюдалось в версии n/a affected
 

Ссылки

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11207
http://www.redhat.com/support/errata/RHSA-2009-0421.html
https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00460.html
http://security.gentoo.org/glsa/glsa-201412-17.xml
http://www.redhat.com/support/errata/RHSA-2009-0420.html
https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00211.html
https://bugzilla.redhat.com/show_bug.cgi?id=491853
http://sunsolve.sun.com/search/document.do?assetkey=1-26-262288-1
https://exchange.xforce.ibmcloud.com/vulnerabilities/50381
http://www.securityfocus.com/archive/1/502757/100/0/threaded
http://secunia.com/advisories/34729
https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00217.html
http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00003.html
http://www.mandriva.com/security/advisories?name=MDVSA-2009:095
https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00461.html
http://secunia.com/advisories/34711
http://secunia.com/advisories/34732
http://secunia.com/advisories/35569
http://www.vupen.com/english/advisories/2009/1708
http://www.mandriva.com/security/advisories?name=MDVSA-2009:096
http://secunia.com/advisories/35559
http://secunia.com/advisories/34373
http://secunia.com/advisories/35416
http://wiki.rpath.com/Advisories:rPSA-2009-0060
https://usn.ubuntu.com/757-1/
http://support.avaya.com/elmodocs2/security/ASA-2009-155.htm
http://secunia.com/advisories/34726
http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00010.html
http://secunia.com/advisories/34667

CVE Program Container

Обновлено: 07.08.2024
SSVC and KEV, plus CVSS and CWE if not provided by the CNA.

Ссылки

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11207
http://www.redhat.com/support/errata/RHSA-2009-0421.html
https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00460.html
http://security.gentoo.org/glsa/glsa-201412-17.xml
http://www.redhat.com/support/errata/RHSA-2009-0420.html
https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00211.html
https://bugzilla.redhat.com/show_bug.cgi?id=491853
http://sunsolve.sun.com/search/document.do?assetkey=1-26-262288-1
https://exchange.xforce.ibmcloud.com/vulnerabilities/50381
http://www.securityfocus.com/archive/1/502757/100/0/threaded
http://secunia.com/advisories/34729
https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00217.html
http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00003.html
http://www.mandriva.com/security/advisories?name=MDVSA-2009:095
https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00461.html
http://secunia.com/advisories/34711
http://secunia.com/advisories/34732
http://secunia.com/advisories/35569
http://www.vupen.com/english/advisories/2009/1708
http://www.mandriva.com/security/advisories?name=MDVSA-2009:096
http://secunia.com/advisories/35559
http://secunia.com/advisories/34373
http://secunia.com/advisories/35416
http://wiki.rpath.com/Advisories:rPSA-2009-0060
https://usn.ubuntu.com/757-1/
http://support.avaya.com/elmodocs2/security/ASA-2009-155.htm
http://secunia.com/advisories/34726
http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00010.html
http://secunia.com/advisories/34667

Мы используем cookie-файлы, чтобы получить статистику, которая помогает нам улучшить сервис для вас с целью персонализации сервисов и предложений. Вы может прочитать подробнее о cookie-файлах или изменить настройки браузера. Продолжая пользоваться сайтом, вы даёте согласие на использование ваших cookie-файлов и соглашаетесь с Политикой обработки персональных данных.