openSUSE 安全更新:libqt4 (openSUSE-SU-2013:0157-1)

medium Nessus 插件 ID 74885

简介

远程 openSUSE 主机缺少安全更新。

描述

libqt4 进行了以下安全修复:

- XMLHttpRequest 可重定向到文件:URL(CVE-2012-5624、bnc#793194)

- 默认禁用 SSL 压缩以缓解 CRIME 攻击 (CVE-2012-4929)

解决方案

更新受影响的 libqt4 程序包。

另见

https://bugzilla.novell.com/show_bug.cgi?id=793194

https://lists.opensuse.org/opensuse-updates/2013-01/msg00048.html

插件详情

严重性: Medium

ID: 74885

文件名: openSUSE-2013-10.nasl

版本: 1.6

类型: local

代理: unix

发布时间: 2014/6/13

最近更新时间: 2021/1/19

支持的传感器: Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

风险信息

VPR

风险因素: Medium

分数: 4.9

CVSS v2

风险因素: Medium

基本分数: 4.3

时间分数: 3.2

矢量: CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N

漏洞信息

CPE: p-cpe:/a:novell:opensuse:libqt4, p-cpe:/a:novell:opensuse:libqt4-32bit, p-cpe:/a:novell:opensuse:libqt4-debuginfo, p-cpe:/a:novell:opensuse:libqt4-debuginfo-32bit, p-cpe:/a:novell:opensuse:libqt4-debugsource, p-cpe:/a:novell:opensuse:libqt4-devel, p-cpe:/a:novell:opensuse:libqt4-devel-debuginfo, p-cpe:/a:novell:opensuse:libqt4-private-headers-devel, p-cpe:/a:novell:opensuse:libqt4-qt3support, p-cpe:/a:novell:opensuse:libqt4-qt3support-32bit, p-cpe:/a:novell:opensuse:libqt4-qt3support-debuginfo, p-cpe:/a:novell:opensuse:libqt4-qt3support-debuginfo-32bit, p-cpe:/a:novell:opensuse:libqt4-sql, p-cpe:/a:novell:opensuse:libqt4-sql-32bit, p-cpe:/a:novell:opensuse:libqt4-sql-debuginfo, p-cpe:/a:novell:opensuse:libqt4-sql-debuginfo-32bit, p-cpe:/a:novell:opensuse:libqt4-sql-sqlite, p-cpe:/a:novell:opensuse:libqt4-sql-sqlite-32bit, p-cpe:/a:novell:opensuse:libqt4-sql-sqlite-debuginfo, p-cpe:/a:novell:opensuse:libqt4-sql-sqlite-debuginfo-32bit, p-cpe:/a:novell:opensuse:libqt4-x11, p-cpe:/a:novell:opensuse:libqt4-x11-32bit, p-cpe:/a:novell:opensuse:libqt4-x11-debuginfo, p-cpe:/a:novell:opensuse:libqt4-x11-debuginfo-32bit, cpe:/o:novell:opensuse:12.1

必需的 KB 项: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

易利用性: No known exploits are available

补丁发布日期: 2012/12/27

参考资料信息

CVE: CVE-2012-4929, CVE-2012-5624