JVN Info.
- Id
- 43416
- Name
- JVNDB-2009-004423
- Title
- OpenOffice.org の Word processor におけるサービス運用妨害 (DoS) の脆弱性
- Summary
- OpenOffice.org の Word processor には、サービス運用妨害 (クラッシュ) 状態となる脆弱性が存在します。
- Nvdinfo
- CVE-2009-0259
- Cvssv2
- 9.3
- Jvnurl
- http://jvndb.jvn.jp/ja/contents/2009/JVNDB-2009-004423.html
- Published Date
- 2009-01-22
- Registered Date
- 2012-09-25
- Last Updated Date
- 2012-09-25
Related Nessuslogs
Id | Log ID | Jvninfo Id | Plugin ID | CVE | CVSS | Risk | Host | Protocol | Port | Name | Synopsis | Description | Solution | See Also | Plugin Output | Actions |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
51181 | H28_MUN_DWEB_Q4_172_16_240_seg.csv | 43416 | 89035 | CVE-2012-1516 | 9 | High | 172.16.240.115 | tcp | 443 | VMware ESX / ESXi Multiple Vulnerabilities (VMSA-2012-0009) (remote check) | The remote VMware ESX / ESXi host is missing a security-related patch. | The remote VMware ESX / ESXi host is affected by multiple vulnerabilities : - Multiple privilege escalation vulnerabilities exist due to improper handling of RPC commands. A local attacker (guest user) can exploit these to manipulate data and function pointers, resulting in a denial of service condition or the execution of arbitrary code on the host OS. (CVE-2012-1516, CVE-2012-1517) - A remote code execution vulnerability exists due to improper sanitization of user-supplied input when parsing NFS traffic. An unauthenticated, remote attacker can exploit this to corrupt memory, resulting in the execution of arbitrary code. (CVE-2012-2448) - Multiple privilege escalation vulnerabilities exist due to an error that occurs in virtual floppy devices and SCSI devices. A local attacker (guest user) can exploit these to cause an out-of-bounds write error, resulting in a denial of service condition or the execution of arbitrary code on the host OS. (CVE-2012-2449, CVE-2012-2450) | Apply the appropriate patch according to the vendor advisory that pertains to ESX version 3.5 / 4.0 / 4.1 or ESXi version 3.5 / 4.0 / 4.1 / 5.0. | http://www.vmware.com/security/advisories/VMSA-2012-0009.html | ESX version : ESX 4.0 Installed build : 208167 Fixed build : 702116 | |
56762 | H28_DWEB_NW_Scan_Q1_172_16_240_Seg_20160518_hepxqa.csv | 43416 | 89035 | CVE-2012-1516 | 9 | High | 172.16.240.115 | tcp | 443 | VMware ESX / ESXi Multiple Vulnerabilities (VMSA-2012-0009) (remote check) | The remote VMware ESX / ESXi host is missing a security-related patch. | The remote VMware ESX / ESXi host is affected by multiple vulnerabilities : - Multiple privilege escalation vulnerabilities exist due to improper handling of RPC commands. A local attacker (guest user) can exploit these to manipulate data and function pointers, resulting in a denial of service condition or the execution of arbitrary code on the host OS. (CVE-2012-1516, CVE-2012-1517) - A remote code execution vulnerability exists due to improper sanitization of user-supplied input when parsing NFS traffic. An unauthenticated, remote attacker can exploit this to corrupt memory, resulting in the execution of arbitrary code. (CVE-2012-2448) - Multiple privilege escalation vulnerabilities exist due to an error that occurs in virtual floppy devices and SCSI devices. A local attacker (guest user) can exploit these to cause an out-of-bounds write error, resulting in a denial of service condition or the execution of arbitrary code on the host OS. (CVE-2012-2449, CVE-2012-2450) | Apply the appropriate patch according to the vendor advisory that pertains to ESX version 3.5 / 4.0 / 4.1 or ESXi version 3.5 / 4.0 / 4.1 / 5.0. | http://www.vmware.com/security/advisories/VMSA-2012-0009.html | ESX version : ESX 4.0 Installed build : 208167 Fixed build : 702116 |