Professional OVAL Repository
[Eng]
[Rus]
[Sign-In]
OVAL
Search
Categories
RedCheck
About
OVAL Definitions
OVAL Items
FSTEC Data Bank Information Security Threats
NKCKI
EOL (End Of Life)
Linux Security Advisories
Mozilla Foundation Security Advisory
IBM
VMware
Cisco
Check Point Software Technologies
Apache
Solaris
FreeBSD
Development
GitHub Enterprise
Google Chrome Security Advisories
Oracle Security Advisories
Adobe Security Advisories
OpenSSL Security Advisories
Microsoft
CVE
CWE
CPE
Latest Updates
OS ROSA
ALT Linux
Astra Linux
RED OS
DSA (Debian Security Advisory) Patсh Statistics
DSA (Debian Security Advisory) Patсh Feed
DSA (Debian Security Advisory) Vulnerability Feed
DLA (Debian Security Advisory) Patсh Statistics
DLA (Debian Security Advisory) Patсh Feed
DLA (Debian Security Advisory) Vulnerability Feed
ALT Linux (Security Bulletins) Patсh Statistics
ALT Linux (Security Bulletins) Patсh Feed
ALT Linux (Security Bulletins) Vulnerability Feed
RED OS (Security Bulletins) Patсh Statistics
RED OS (Security Bulletins) Patсh Feed
RED OS (Security Bulletins) Vulnerability Feed
USN (Ubuntu Security Notice) Patсh Statistics
USN (Ubuntu Security Notice) Patсh Feed
USN (Ubuntu Security Notice) Vulnerability Feed
RHSA (RedHat Security Advisory) Patсh Statistics
RHSA (RedHat Security Advisory) Patсh Feed
RHSA (RedHat Security Advisory) Vulnerability Feed
ELSA (Oracle Linux Security Advisory) Patсh Statistics
ELSA (Oracle Linux Security Advisory) Patсh Feed
ELSA (Oracle Linux Security Advisory) Vulnerability Feed
SUSE (SUSE Security Advisories) Patсh Statistics
SUSE (SUSE Security Advisories) Patсh Feed
SUSE (SUSE Security Advisories) Vulnerability Feed
openSUSE (openSUSE Security Advisories) Patсh Statistics
openSUSE (openSUSE Security Advisories) Patсh Feed
openSUSE (openSUSE Security Advisories) Vulnerability Feed
Amazon Linux AMI (Security Bulletins) Patсh Statistics
Amazon Linux AMI (Security Bulletins) Patсh Feed
Amazon Linux AMI (Security Bulletins) Vulnerability Feed
Mageia Linux (Security Bulletins) Patсh Statistics
Mageia Linux (Security Bulletins) Patсh Feed
Mageia Linux (Security Bulletins) Vulnerability Feed
OS ROSA SX COBALT 1.0
OS ROSA DX COBALT 1.0
ROSA 7.3 (Security Advisories) Patсh Statistics
ROSA 7.3 (Security Advisories) Patсh Feed
ROSA 7.3 (Security Advisories) Vulnerability Feed
ALT Linux SPT 6.0
ALT Linux SPT 7.0
ALT 8 SP
ALT 9
Astra Linux SE 1.5
Astra Linux SE 1.6
Astra Linux SE 1.7
Astra Linux SE 1.8
RED OS Murom 7.1
RED OS Murom 7.2
IBM DB2
VMware Vulnerabilities Advisory (VMSA)
VMware vCenter Patch Advisories
VMware ESXi Patch Advisories
VMware NSX Patches
VMware NSX Vulnerabilities
VMware Photon OS 1.0 Patches
VMware Photon OS 1.0 Vulnerabilities
VMware Photon OS 2.0 Patches
VMware Photon OS 2.0 Vulnerabilities
Cisco ASA
Cisco IOS/NX-OS Advisory
Cisco NX-OS Vulnerabilities
Check Point Gaia
Apache Tomcat Advisories
Apache Tomcat Server
Apache HTTP Server
Python
Node.js
RubyGems
Qt
Microsoft Security Bulletin
Microsoft Knowledge Base Article
Microsoft SharePoint
Microsoft SharePoint Foundation 2013
Microsoft SharePoint Server 2013
Microsoft SharePoint Server 2016
About OVALdb
User manual
Pricing
Contact us
OVAL Definitions
>
OVAL Definition Details
Id
oval:ru.altx-soft.nix:def:44311
[Eng]
Version
3
Class
vulnerability
ALTXid
214531
Language
Russian
Severity
NotAvailable
Title
Debian -- уязвимость в glibc, eglibc (CVE-2008-1391)
Description
В продуктах glibc, eglibc обнаружена уязвимость CVE-2008-1391.
Family
unix
Platform
Debian GNU/Linux 5.0
Product
eglibc
glibc
Reference
FSTEC: BDU:2015-04447
FSTEC: BDU:2015-04447
Id:
BDU:2015-04447
Reference:
https://bdu.fstec.ru/vul/2015-04447
FSTEC: BDU:2015-04446
FSTEC: BDU:2015-04446
Id:
BDU:2015-04446
Reference:
https://bdu.fstec.ru/vul/2015-04446
FSTEC: BDU:2015-04445
FSTEC: BDU:2015-04445
Id:
BDU:2015-04445
Reference:
https://bdu.fstec.ru/vul/2015-04445
FSTEC: BDU:2015-04444
FSTEC: BDU:2015-04444
Id:
BDU:2015-04444
Reference:
https://bdu.fstec.ru/vul/2015-04444
FSTEC: BDU:2015-04443
FSTEC: BDU:2015-04443
Id:
BDU:2015-04443
Reference:
https://bdu.fstec.ru/vul/2015-04443
FSTEC: BDU:2015-04442
FSTEC: BDU:2015-04442
Id:
BDU:2015-04442
Reference:
https://bdu.fstec.ru/vul/2015-04442
FSTEC: BDU:2015-04441
FSTEC: BDU:2015-04441
Id:
BDU:2015-04441
Reference:
https://bdu.fstec.ru/vul/2015-04441
FSTEC: BDU:2015-04440
FSTEC: BDU:2015-04440
Id:
BDU:2015-04440
Reference:
https://bdu.fstec.ru/vul/2015-04440
FSTEC: BDU:2015-01170
FSTEC: BDU:2015-01170
Id:
BDU:2015-01170
Reference:
https://bdu.fstec.ru/vul/2015-01170
FSTEC: BDU:2015-01169
FSTEC: BDU:2015-01169
Id:
BDU:2015-01169
Reference:
https://bdu.fstec.ru/vul/2015-01169
FSTEC: BDU:2015-01168
FSTEC: BDU:2015-01168
Id:
BDU:2015-01168
Reference:
https://bdu.fstec.ru/vul/2015-01168
FSTEC: BDU:2015-01167
FSTEC: BDU:2015-01167
Id:
BDU:2015-01167
Reference:
https://bdu.fstec.ru/vul/2015-01167
FSTEC: BDU:2015-01166
FSTEC: BDU:2015-01166
Id:
BDU:2015-01166
Reference:
https://bdu.fstec.ru/vul/2015-01166
FSTEC: BDU:2015-01165
FSTEC: BDU:2015-01165
Id:
BDU:2015-01165
Reference:
https://bdu.fstec.ru/vul/2015-01165
FSTEC: BDU:2015-01164
FSTEC: BDU:2015-01164
Id:
BDU:2015-01164
Reference:
https://bdu.fstec.ru/vul/2015-01164
FSTEC: BDU:2015-01163
FSTEC: BDU:2015-01163
Id:
BDU:2015-01163
Reference:
https://bdu.fstec.ru/vul/2015-01163
FSTEC: BDU:2015-01162
FSTEC: BDU:2015-01162
Id:
BDU:2015-01162
Reference:
https://bdu.fstec.ru/vul/2015-01162
FSTEC: BDU:2015-01161
FSTEC: BDU:2015-01161
Id:
BDU:2015-01161
Reference:
https://bdu.fstec.ru/vul/2015-01161
FSTEC: BDU:2015-01160
FSTEC: BDU:2015-01160
Id:
BDU:2015-01160
Reference:
https://bdu.fstec.ru/vul/2015-01160
FSTEC: BDU:2015-01159
FSTEC: BDU:2015-01159
Id:
BDU:2015-01159
Reference:
https://bdu.fstec.ru/vul/2015-01159
FSTEC: BDU:2015-01158
FSTEC: BDU:2015-01158
Id:
BDU:2015-01158
Reference:
https://bdu.fstec.ru/vul/2015-01158
FSTEC: BDU:2015-01157
FSTEC: BDU:2015-01157
Id:
BDU:2015-01157
Reference:
https://bdu.fstec.ru/vul/2015-01157
FSTEC: BDU:2015-01156
FSTEC: BDU:2015-01156
Id:
BDU:2015-01156
Reference:
https://bdu.fstec.ru/vul/2015-01156
FSTEC: BDU:2015-01155
FSTEC: BDU:2015-01155
Id:
BDU:2015-01155
Reference:
https://bdu.fstec.ru/vul/2015-01155
FSTEC: BDU:2015-01154
FSTEC: BDU:2015-01154
Id:
BDU:2015-01154
Reference:
https://bdu.fstec.ru/vul/2015-01154
FSTEC: BDU:2015-01153
FSTEC: BDU:2015-01153
Id:
BDU:2015-01153
Reference:
https://bdu.fstec.ru/vul/2015-01153
FSTEC: BDU:2015-01152
FSTEC: BDU:2015-01152
Id:
BDU:2015-01152
Reference:
https://bdu.fstec.ru/vul/2015-01152
FSTEC: BDU:2015-01151
FSTEC: BDU:2015-01151
Id:
BDU:2015-01151
Reference:
https://bdu.fstec.ru/vul/2015-01151
FSTEC: BDU:2015-01150
FSTEC: BDU:2015-01150
Id:
BDU:2015-01150
Reference:
https://bdu.fstec.ru/vul/2015-01150
FSTEC: BDU:2015-01149
FSTEC: BDU:2015-01149
Id:
BDU:2015-01149
Reference:
https://bdu.fstec.ru/vul/2015-01149
FSTEC: BDU:2015-01148
FSTEC: BDU:2015-01148
Id:
BDU:2015-01148
Reference:
https://bdu.fstec.ru/vul/2015-01148
FSTEC: BDU:2015-01147
FSTEC: BDU:2015-01147
Id:
BDU:2015-01147
Reference:
https://bdu.fstec.ru/vul/2015-01147
FSTEC: BDU:2015-01146
FSTEC: BDU:2015-01146
Id:
BDU:2015-01146
Reference:
https://bdu.fstec.ru/vul/2015-01146
FSTEC: BDU:2015-01145
FSTEC: BDU:2015-01145
Id:
BDU:2015-01145
Reference:
https://bdu.fstec.ru/vul/2015-01145
FSTEC: BDU:2015-01144
FSTEC: BDU:2015-01144
Id:
BDU:2015-01144
Reference:
https://bdu.fstec.ru/vul/2015-01144
FSTEC: BDU:2015-01143
FSTEC: BDU:2015-01143
Id:
BDU:2015-01143
Reference:
https://bdu.fstec.ru/vul/2015-01143
FSTEC: BDU:2015-01142
FSTEC: BDU:2015-01142
Id:
BDU:2015-01142
Reference:
https://bdu.fstec.ru/vul/2015-01142
FSTEC: BDU:2015-01141
FSTEC: BDU:2015-01141
Id:
BDU:2015-01141
Reference:
https://bdu.fstec.ru/vul/2015-01141
FSTEC: BDU:2015-01140
FSTEC: BDU:2015-01140
Id:
BDU:2015-01140
Reference:
https://bdu.fstec.ru/vul/2015-01140
FSTEC: BDU:2015-01139
FSTEC: BDU:2015-01139
Id:
BDU:2015-01139
Reference:
https://bdu.fstec.ru/vul/2015-01139
FSTEC: BDU:2015-01138
FSTEC: BDU:2015-01138
Id:
BDU:2015-01138
Reference:
https://bdu.fstec.ru/vul/2015-01138
FSTEC: BDU:2015-01137
FSTEC: BDU:2015-01137
Id:
BDU:2015-01137
Reference:
https://bdu.fstec.ru/vul/2015-01137
FSTEC: BDU:2015-01136
FSTEC: BDU:2015-01136
Id:
BDU:2015-01136
Reference:
https://bdu.fstec.ru/vul/2015-01136
FSTEC: BDU:2015-01135
FSTEC: BDU:2015-01135
Id:
BDU:2015-01135
Reference:
https://bdu.fstec.ru/vul/2015-01135
FSTEC: BDU:2015-01134
FSTEC: BDU:2015-01134
Id:
BDU:2015-01134
Reference:
https://bdu.fstec.ru/vul/2015-01134
CVE: CVE-2008-1391
CVE: CVE-2008-1391
Id:
CVE-2008-1391
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1391
Comment
: Multiple integer overflows in libc in NetBSD 4.x, FreeBSD 6.x and 7.x, and probably other BSD and Apple Mac OS platforms allow context-dependent attackers to execute arbitrary code via large values of certain integer fields in the format argument to (1) the strfmon function in lib/libc/stdlib/strfmon.c, related to the GET_NUMBER macro; and (2) the printf function, related to left_prec and right_prec.
CWE:
189 (Numeric Errors)
References:
http://cvsweb.netbsd.org/bsdweb.cgi/src/lib/libc/stdlib/strfmon.c (CONFIRM)
APPLE-SA-2008-12-15 (APPLE)
29574 (SECUNIA)
33179 (SECUNIA)
20080325 *BSD libc (strfmon) Multiple vulnerabilities (SREASONRES)
3770 (SREASON)
http://support.apple.com/kb/HT3338 (CONFIRM)
DSA-2058 (DEBIAN)
20080327 [securityreason] *BSD libc (strfmon) Multiple vulnerabilities (BUGTRAQ)
28479 (BID)
1019722 (SECTRACK)
TA08-350A (CERT)
ADV-2008-3444 (VUPEN)
bsd-strfmon-overflow(41504) (XF)
SUSE-SA:2010:052 (SUSE)
VENDOR: DSA-2058-1
VENDOR: DSA-2058-1
Id:
DSA-2058-1
Reference:
http://lists.debian.org/debian-security-announce/2010/msg00101.html
Content available only for registered users!
ovaldb@altx-soft.com