Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

fstec логотип

BDU:2015-04094

Опубликовано: 01 янв. 2015
Источник: fstec
CVSS2: 4.6
EPSS Низкий

Описание

Множественные уязвимости пакета libnewt-pic операционной системы Debian GNU/Linux, эксплуатация которых может привести к нарушению конфиденциальности, целостности и доступности защищаемой информации. Эксплуатация уязвимостей может быть осуществлена локальным злоумышленником

Вендор

Сообщество свободного программного обеспечения

Наименование ПО

Debian GNU/Linux

Версия ПО

до 4 (Debian GNU/Linux)

Тип ПО

Операционная система

Операционные системы и аппаратные платформы

-

Уровень опасности уязвимости

Средний уровень опасности (базовая оценка CVSS 2.0 составляет 4,6)

Возможные меры по устранению уязвимости

Проблема может быть решена обновлением операционной системы до следующих версий пакетов в зависимости от архитектуры:
Debian GNU/Linux 4:
ppc:
python-newt - 0.52.2-10+etch1
newt-tcl - 0.52.2-10+etch1
libnewt-dev - 0.52.2-10+etch1
libnewt-pic - 0.52.2-10+etch1
libnewt0.52 - 0.52.2-10+etch1
whiptail - 0.52.2-10+etch1
s390x:
libnewt-pic - 0.52.2-10+etch1
libnewt-dev - 0.52.2-10+etch1
whiptail - 0.52.2-10+etch1
python-newt - 0.52.2-10+etch1
newt-tcl - 0.52.2-10+etch1
libnewt0.52 - 0.52.2-10+etch1
i686:
newt-tcl - 0.52.2-10+etch1
libnewt-pic - 0.52.2-10+etch1
whiptail - 0.52.2-10+etch1
python-newt - 0.52.2-10+etch1
libnewt-dev - 0.52.2-10+etch1
libnewt0.52 - 0.52.2-10+etch1
sparc:
libnewt0.52 - 0.52.2-10+etch1
libnewt-pic - 0.52.2-10+etch1
libnewt-dev - 0.52.2-10+etch1
newt-tcl - 0.52.2-10+etch1
python-newt - 0.52.2-10+etch1
whiptail - 0.52.2-10+etch1
x86-64:
newt-tcl - 0.52.2-10+etch1
python-newt - 0.52.2-10+etch1
libnewt-pic - 0.52.2-10+etch1
whiptail - 0.52.2-10+etch1
libnewt0.52 - 0.52.2-10+etch1
libnewt-dev - 0.52.2-10+etch1
alpha:
whiptail - 0.52.2-10+etch1
libnewt0.52 - 0.52.2-10+etch1
libnewt-dev - 0.52.2-10+etch1
python-newt - 0.52.2-10+etch1
libnewt-pic - 0.52.2-10+etch1
newt-tcl - 0.52.2-10+etch1
ia64:
libnewt-pic - 0.52.2-10+etch1
libnewt-dev - 0.52.2-10+etch1
whiptail - 0.52.2-10+etch1
libnewt0.52 - 0.52.2-10+etch1
newt-tcl - 0.52.2-10+etch1
python-newt - 0.52.2-10+etch1
mips:
whiptail - 0.52.2-10+etch1
libnewt-pic - 0.52.2-10+etch1
libnewt-dev - 0.52.2-10+etch1
newt-tcl - 0.52.2-10+etch1
libnewt0.52 - 0.52.2-10+etch1
python-newt - 0.52.2-10+etch1
mipsel:
newt-tcl - 0.52.2-10+etch1
python-newt - 0.52.2-10+etch1
libnewt-dev - 0.52.2-10+etch1
libnewt0.52 - 0.52.2-10+etch1
whiptail - 0.52.2-10+etch1
libnewt-pic - 0.52.2-10+etch1
arm:
whiptail - 0.52.2-10+etch1
libnewt-pic - 0.52.2-10+etch1
newt-tcl - 0.52.2-10+etch1
python-newt - 0.52.2-10+etch1
libnewt-dev - 0.52.2-10+etch1
libnewt0.52 - 0.52.2-10+etch1
Debian GNU/Linux 5:
ppc:
libnewt-pic - 0.52.2-11.3+lenny1
whiptail - 0.52.2-11.3+lenny1
python-newt - 0.52.2-11.3+lenny1
libnewt0.52 - 0.52.2-11.3+lenny1
libnewt-dev - 0.52.2-11.3+lenny1
newt-tcl - 0.52.2-11.3+lenny1
i686:
libnewt-pic - 0.52.2-11.3+lenny1
newt-tcl - 0.52.2-11.3+lenny1
python-newt - 0.52.2-11.3+lenny1
libnewt-dev - 0.52.2-11.3+lenny1
whiptail - 0.52.2-11.3+lenny1
libnewt0.52 - 0.52.2-11.3+lenny1
arm:
whiptail - 0.52.2-11.3+lenny1
python-newt - 0.52.2-11.3+lenny1
libnewt-dev - 0.52.2-11.3+lenny1
libnewt0.52 - 0.52.2-11.3+lenny1
newt-tcl - 0.52.2-11.3+lenny1
libnewt-pic - 0.52.2-11.3+lenny1
sparc:
whiptail - 0.52.2-11.3+lenny1
libnewt-dev - 0.52.2-11.3+lenny1
python-newt - 0.52.2-11.3+lenny1
newt-tcl - 0.52.2-11.3+lenny1
libnewt0.52 - 0.52.2-11.3+lenny1
libnewt-pic - 0.52.2-11.3+lenny1
x86-64:
python-newt - 0.52.2-11.3+lenny1
newt-tcl - 0.52.2-11.3+lenny1
libnewt-dev - 0.52.2-11.3+lenny1
libnewt-pic - 0.52.2-11.3+lenny1
libnewt0.52 - 0.52.2-11.3+lenny1
whiptail - 0.52.2-11.3+lenny1
armel:
newt-tcl - 0.52.2-11.3+lenny1
libnewt-pic - 0.52.2-11.3+lenny1
libnewt-dev - 0.52.2-11.3+lenny1
whiptail - 0.52.2-11.3+lenny1
libnewt0.52 - 0.52.2-11.3+lenny1
python-newt - 0.52.2-11.3+lenny1
alpha:
libnewt0.52 - 0.52.2-11.3+lenny1
libnewt-pic - 0.52.2-11.3+lenny1
whiptail - 0.52.2-11.3+lenny1
python-newt - 0.52.2-11.3+lenny1
newt-tcl - 0.52.2-11.3+lenny1
libnewt-dev - 0.52.2-11.3+lenny1
ia64:
libnewt-dev - 0.52.2-11.3+lenny1
libnewt0.52 - 0.52.2-11.3+lenny1
newt-tcl - 0.52.2-11.3+lenny1
python-newt - 0.52.2-11.3+lenny1
whiptail - 0.52.2-11.3+lenny1
libnewt-pic - 0.52.2-11.3+lenny1
mips:
newt-tcl - 0.52.2-11.3+lenny1
libnewt0.52 - 0.52.2-11.3+lenny1
libnewt-dev - 0.52.2-11.3+lenny1
libnewt-pic - 0.52.2-11.3+lenny1
python-newt - 0.52.2-11.3+lenny1
whiptail - 0.52.2-11.3+lenny1
mipsel:
whiptail - 0.52.2-11.3+lenny1
python-newt - 0.52.2-11.3+lenny1
libnewt0.52 - 0.52.2-11.3+lenny1
libnewt-pic - 0.52.2-11.3+lenny1
newt-tcl - 0.52.2-11.3+lenny1
libnewt-dev - 0.52.2-11.3+lenny1
hppa:
libnewt0.52 - 0.52.2-11.3+lenny1
libnewt-dev - 0.52.2-11.3+lenny1
whiptail - 0.52.2-11.3+lenny1
python-newt - 0.52.2-11.3+lenny1
newt-tcl - 0.52.2-11.3+lenny1
libnewt-pic - 0.52.2-11.3+lenny1

Статус уязвимости

Подтверждена производителем

Наличие эксплойта

Данные уточняются

Информация об устранении

Уязвимость устранена

Идентификаторы других систем описаний уязвимостей

EPSS

Процентиль: 24%
0.00078
Низкий

4.6 Medium

CVSS2

Связанные уязвимости

ubuntu
почти 16 лет назад

Heap-based buffer overflow in textbox.c in newt 0.51.5, 0.51.6, and 0.52.2 allows local users to cause a denial of service (application crash) or possibly execute arbitrary code via a request to display a crafted text dialog box.

redhat
почти 16 лет назад

Heap-based buffer overflow in textbox.c in newt 0.51.5, 0.51.6, and 0.52.2 allows local users to cause a denial of service (application crash) or possibly execute arbitrary code via a request to display a crafted text dialog box.

nvd
почти 16 лет назад

Heap-based buffer overflow in textbox.c in newt 0.51.5, 0.51.6, and 0.52.2 allows local users to cause a denial of service (application crash) or possibly execute arbitrary code via a request to display a crafted text dialog box.

debian
почти 16 лет назад

Heap-based buffer overflow in textbox.c in newt 0.51.5, 0.51.6, and 0. ...

github
больше 3 лет назад

Heap-based buffer overflow in textbox.c in newt 0.51.5, 0.51.6, and 0.52.2 allows local users to cause a denial of service (application crash) or possibly execute arbitrary code via a request to display a crafted text dialog box.

EPSS

Процентиль: 24%
0.00078
Низкий

4.6 Medium

CVSS2