Vulnerability Summary for the Week of August 28, 2017

Total Page:16

File Type:pdf, Size:1020Kb

Vulnerability Summary for the Week of August 28, 2017 Vulnerability Summary for the Week of August 28, 2017 The vulnerabilities are based on the CVE vulnerability naming standard and are organized according to severity, determined by the Common Vulnerability Scoring System (CVSS) standard. The division of high, medium, and low severities correspond to the following scores: High - Vulnerabilities will be labeled High severity if they have a CVSS base score of 7.0 - 10.0 Medium - Vulnerabilities will be labeled Medium severity if they have a CVSS base score of 4.0 - 6.9 Low - Vulnerabilities will be labeled Low severity if they have a CVSS base score of 0.0 - 3.9 High Vulnerabilities CVS S Primary Publish Scor Source & Vendor -- Product Description ed e Patch Info Aruba Networks ClearPass Policy Manager before 6.4.7 and 6.5.x before 6.5.2 allows remote authenticated administrators to write to arbitrary files within the underlying operating system and consequently cause a denial of service or gain privileges by leveraging CVE-2015- incorrect 3653 permission 2017- CONFIRM(li arubanetworks -- clearpass checking. 08-29 9.0 nk is external) Aruba Networks ClearPass Policy Manager before 6.4.7 and 6.5.x before 6.5.2 allows remote CVE-2015- authenticated 3654 administrators to 2017- CONFIRM(li arubanetworks -- clearpass gain root 08-29 9.0 nk is external) CVS S Primary Publish Scor Source & Vendor -- Product Description ed e Patch Info privileges via unspecified vectors, a different vulnerability than CVE-2015-4649. Aruba Networks ClearPass Policy Manager before 6.4.7 and 6.5.x before 6.5.2 allows remote authenticated administrators to gain root CVE-2015- privileges via 4649 unspecified CONFIRM(li vectors, a different nk is external) vulnerability than 2017- BID(link is arubanetworks -- clearpass CVE-2015-3654. 08-29 9.0 external) Hard coded weak CVE-2014- credentials in 8426 Barracuda Load MISC(link is Balancer 2017- external) barracuda -- load_balancer 5.0.0.015. 08-28 7.5 FULLDISC Privilege escalation vulnerability in Barracuda Load Balancer 5.0.0.015 CVE-2014- via the use of an 8428 improperly MISC(link is protected SSH 2017- external) barracuda -- load_balancer key. 08-28 7.5 FULLDISC SQL injection vulnerability in the baserCMS 3.0.14 and earlier, CVE-2017- 4.0.5 and earlier 10842 allows remote JVN(link is attackers to external) execute arbitrary 2017- MISC(link is basercms -- basercms SQL commands 08-28 7.5 external) CVS S Primary Publish Scor Source & Vendor -- Product Description ed e Patch Info via unspecified vectors. CVE-2014- 9637 CONFIRM FEDORA FEDORA GNU patch 2.7.2 MLIST(link and earlier allows is external) remote attackers BID(link is to cause a denial external) of service UBUNTU(lin (memory k is external) consumption and CONFIRM(li segmentation nk is external) fault) via a crafted 2017- CONFIRM canonical -- ubuntu_linux diff file. 08-25 7.1 CONFIRM Apport before 2.17.2-0ubuntu1.1 as packaged in Ubuntu 15.04, before 2.14.70ubuntu8.5 as packaged in Ubuntu 14.10, before 2.14.1- 0ubuntu3.11 as packaged in Ubuntu 14.04 LTS, and before 2.0.1-0ubuntu17.9 as packaged in Ubuntu 12.04 LTS allow local users to write to CVE-2015- arbitrary files and 1324 gain root BID(link is privileges by external) leveraging UBUNTU(lin incorrect handling k is external) of permissions 2017- CONFIRM(li canonical -- ubuntu_linux when generating 08-25 7.2 nk is external) CVS S Primary Publish Scor Source & Vendor -- Product Description ed e Patch Info core dumps for setuid binaries. CVE-2015- Directory traversal 1395 vulnerability in FEDORA GNU patch FEDORA versions which MLIST(link support Git-style is external) patching before BID(link is 2.7.3 allows external) remote attackers UBUNTU(lin to write to k is external) arbitrary files with MISC the permissions of CONFIRM(li the target user via nk is external) a .. (dot dot) in a 2017- CONFIRM canonical -- ubuntu_linux diff file name. 08-25 7.8 CONFIRM CrushFTP 8.x CVE-2017- before 8.2.0 has a 14035 serialization 2017- CONFIRM(li crushftp -- crushftp vulnerability. 08-30 7.5 nk is external) The C++ symbol demangler routine in cplus-dem.c in libiberty, as distributed in GNU Binutils 2.29, allows remote attackers to cause a denial of service (excessive memory allocation and application crash) via a crafted file, as demonstrated by a call from the Binary File Descriptor (BFD) CVE-2017- library (aka 2017- 13716 gnu -- binutils libbfd). 08-28 7.1 MISC CVS S Primary Publish Scor Source & Vendor -- Product Description ed e Patch Info GraphicsMagick 1.3.26 has a denial of service issue in ReadJNXImage() in coders/jnx.c whereby large amounts of CPU CVE-2017- and memory 13775 resources may be CONFIRM(li consumed nk is external) although the file MISC(link is itself does not external) support the 2017- BID(link is graphicsmagick -- graphicsmagick requests. 08-30 7.1 external) GraphicsMagick 1.3.26 has a denial of service issue in ReadXBMImage() in a coders/xbm.c "Read hex image data" version!=10 case that results in the reader not returning; it would CVE-2017- cause large 13776 amounts of CPU CONFIRM(li and memory nk is external) consumption MISC(link is although the external) crafted file itself 2017- BID(link is graphicsmagick -- graphicsmagick does not request it. 08-30 7.1 external) GraphicsMagick 1.3.26 has a denial of service issue in ReadXBMImage() CVE-2017- in a coders/xbm.c 13777 "Read hex image CONFIRM(li data" version==10 nk is external) case that results in MISC(link is the reader not external) returning; it would 2017- BID(link is graphicsmagick -- graphicsmagick cause large 08-30 7.1 external) CVS S Primary Publish Scor Source & Vendor -- Product Description ed e Patch Info amounts of CPU and memory consumption although the crafted file itself does not request it. The WritePixelCacheP ixels function in ImageMagick 7.0.6-6 allows remote attackers to cause a denial CVE-2017- of service (CPU 12875 consumption) via 2017- CONFIRM(li imagemagick -- imagemagick a crafted file. 08-29 7.1 nk is external) CVE-2013- 7426 Insecure MLIST(link Temporary file is external) vulnerability in BID(link is /tmp/kamailio_fifo 2017- external) kamailio -- kamailio in kamailio 4.0.1. 08-29 7.5 CONFIRM In Kaspersky Internet Security for Android 11.12.4.1622, some of application exports activities have weak permissions, which might be used by a malware application to get unauthorized CVE-2017- access to the 12816 product BID(link is functionality by external) using Android 2017- CONFIRM(li kaspersky -- kaspersky_internet_security IPC. 08-25 7.5 nk is external) CVS S Primary Publish Scor Source & Vendor -- Product Description ed e Patch Info Untrusted search path vulnerability in The electronic authentication system based on the commercial registration system "The CRCA user's Software" Ver1.8 and earlier allows CVE-2017- an attacker to gain 10831 privileges via a MISC(link is moj.go -- Trojan horse DLL external) commercial_registration_electronic_authenticati in an unspecified 2017- JVN(link is on_software directory. 08-28 9.3 external) "Dokodemo eye Smart HD" SCR02HD Firmware 1.0.3.1000 and earlier allows remote attackers CVE-2017- to execute 10832 arbitrary OS MISC(link is commands via external) unspecified 2017- JVN(link is nippon-antenna -- scr02hd_firmware vectors. 08-28 10.0 external) Untrusted search path vulnerability in Flets Azukeru for Windows Auto Backup Tool v1.0.3.0 and earlier allows an CVE-2017- attacker to gain 10827 privileges via a MISC(link is Trojan horse DLL external) in an unspecified 2017- JVN(link is ntt -- flets_azukuu_pc_automatic_backup_tool directory. 08-28 9.3 external) Untrusted search 2017- CVE-2017- ntt -- flets_install_tool path vulnerability 08-28 9.3 10828 CVS S Primary Publish Scor Source & Vendor -- Product Description ed e Patch Info in Flets Install MISC(link is Tool all versions external) distributed JVN(link is through the external) website till 2017 August 8 allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory. Untrusted search path vulnerability in Flets Setsuzoku Tool for Windows all versions allows CVE-2017- an attacker to gain 2242 privileges via a MISC(link is Trojan horse DLL external) in an unspecified 2017- JVN(link is ntt -- flets_setsuzoku_tool directory. 08-28 9.3 external) Untrusted search path vulnerability in Security Kinou Mihariban v1.0.21 and earlier allows CVE-2017- an attacker to gain 10826 privileges via a MISC(link is Trojan horse DLL external) in an unspecified 2017- JVN(link is ntt -- security_kinou_mihariban directory. 08-28 9.3 external) Untrusted search path vulnerability in Security Setup Tool all versions allows an attacker CVE-2017- to gain privileges 10830 via a Trojan horse MISC(link is DLL in an external) unspecified 2017- JVN(link is ntt -- security_setup_tool directory. 08-28 9.3 external) CVS S Primary Publish Scor Source & Vendor -- Product Description ed e Patch Info Untrusted search path vulnerability in Photo Collection PC Software Ver.4.0.2 and earlier allows an attacker to gain privileges via a CVE-2017- Trojan horse DLL 10812 in an unspecified 2017- JVN(link is nttdocomo -- photo_collection_pc_software directory. 08-28 9.3 external) Untrusted search path vulnerability in Optimal Guard 1.1.21 and earlier allows an attacker CVE-2017- to gain privileges 10836 via a Trojan horse JVN(link is DLL in an external) unspecified 2017- MISC(link is optim -- optimal_guard directory. 08-28 9.3 external) CVE-2014- 9558 MISC(link is Multiple SQL external) injection FULLDISC vulnerabilities in 2017- BID(link is smartcms -- smartcms SmartCMS v.2. 08-28 7.5 external) A Stack-based Buffer Overflow issue was discovered in SpiderControl SCADA MicroBrowser Versions CVE-2017- 1.6.30.144 and 12707 prior.
Recommended publications
  • Red Hat Enterprise Linux 8 Installing, Managing, and Removing User-Space Components
    Red Hat Enterprise Linux 8 Installing, managing, and removing user-space components An introduction to AppStream and BaseOS in Red Hat Enterprise Linux 8 Last Updated: 2021-06-25 Red Hat Enterprise Linux 8 Installing, managing, and removing user-space components An introduction to AppStream and BaseOS in Red Hat Enterprise Linux 8 Legal Notice Copyright © 2021 Red Hat, Inc. The text of and illustrations in this document are licensed by Red Hat under a Creative Commons Attribution–Share Alike 3.0 Unported license ("CC-BY-SA"). An explanation of CC-BY-SA is available at http://creativecommons.org/licenses/by-sa/3.0/ . In accordance with CC-BY-SA, if you distribute this document or an adaptation of it, you must provide the URL for the original version. Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, the Red Hat logo, JBoss, OpenShift, Fedora, the Infinity logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries. Linux ® is the registered trademark of Linus Torvalds in the United States and other countries. Java ® is a registered trademark of Oracle and/or its affiliates. XFS ® is a trademark of Silicon Graphics International Corp. or its subsidiaries in the United States and/or other countries. MySQL ® is a registered trademark of MySQL AB in the United States, the European Union and other countries.
    [Show full text]
  • Optional Package 1WIRE Paket OPT OW V. 1.0.0 Für Fli4l - 3.4.0
    Optional Package 1WIRE Paket OPT_OW V. 1.0.0 für Fli4L - 3.4.0 Karl M. Weckler [email protected] Rockenberg, Mai 2009 OPT_OW Inhaltsverzeichnis Paket OPT_OW.......................................................................................................... 1 Inhaltsverzeichnis ....................................................................................................... 2 Dokumentation des Paketes OPT_OW ...................................................................... 3 1. Einleitung................................................................................................................ 3 1.1. OPT_OW ......................................................................................................... 3 1.2. OW = OneWire = 1-Wire .................................................................................. 3 1.2.1. Der 1-Wire Standard.................................................................................. 3 1.2.2. 1-Wire-Bauteile.......................................................................................... 3 1.2.3. 1-Wire Bus................................................................................................. 3 1.3. OWFS .............................................................................................................. 4 1.4. Fuse................................................................................................................. 4 2. Lizenz ....................................................................................................................
    [Show full text]
  • List of Open Source Components Used by Intel® Deployment Assistant
    List of open source components used by Intel® Deployment Assistant S. No Component Link for additional info 1 ALFS 6.1 (Gerard Beekmans) http://www.linuxfromscratch.org/ 2 autoconf-2.59.tar.bz2 ftp://anduin.linuxfromscratch.org/LFS/lfs-packages/6.2/ 3 automake-1.9.6.tar.bz2 ftp://anduin.linuxfromscratch.org/LFS/lfs-packages/6.2/ 4 bash-3.1.tar.gz ftp://anduin.linuxfromscratch.org/LFS/lfs-packages/6.2/ 5 bash-3.1-fixes-8.patch ftp://anduin.linuxfromscratch.org/LFS/lfs-packages/6.2/ 6 binutils-2.16.1.tar.bz2 ftp://anduin.linuxfromscratch.org/LFS/lfs-packages/6.2/ 7 bison-2.2.tar.bz2 ftp://anduin.linuxfromscratch.org/LFS/lfs-packages/6.2/ 8 bzip2-1.0.3.tar.bz2 ftp://anduin.linuxfromscratch.org/LFS/lfs-packages/6.2/ 9 coreutils-6.3.tar.bz2 ftp://anduin.linuxfromscratch.org/LFS/lfs-packages/6.2/ 10 coreutils-6.3-i18n-1.patch ftp://anduin.linuxfromscratch.org/LFS/lfs-packages/6.2/ 11 coreutils-6.3- suppress_uptime_kill_su-1.patch ftp://anduin.linuxfromscratch.org/LFS/lfs-packages/6.2/ 12 coreutils-6.3-uname-1.patch ftp://anduin.linuxfromscratch.org/LFS/lfs-packages/6.2/ 13 dejagnu-1.4.4.tar.bz2 ftp://anduin.linuxfromscratch.org/LFS/lfs-packages/6.2/ 14 diffutils-2.8.1.tar.bz2 ftp://anduin.linuxfromscratch.org/LFS/lfs-packages/6.2/ 15 diffutils-2.8.1-i18n-1.patch ftp://anduin.linuxfromscratch.org/LFS/lfs-packages/6.2/ 16 e2fsprogs-1.39.tar.gz ftp://anduin.linuxfromscratch.org/LFS/lfs-packages/6.2/ 17 expect-5.43.0.tar.bz2 ftp://anduin.linuxfromscratch.org/LFS/lfs-packages/6.2/ 18 expect-5.43.0-spawn-1.patch ftp://anduin.linuxfromscratch.org/LFS/lfs-packages/6.2/
    [Show full text]
  • Linux. Sécuriser Un Réseau
    11960_Securiser_Linux_XP 31/10/06 9:40 Page 1 Cahiers Cahiers de de l’Admin Collection dirigée par Nat Makarévitch Delaunay Boutherin l’Admin B. B. Ingénieur de formation, Bernard Boutherin a éd. éd. e été administrateur système et e 3 édition réseau successivement dans e trois laboratoires du CNRS. Il 3 est actuellement responsable in- 3 Quelles règles d’or appliquer pour préserver la sûreté d’un réseau Linux ? formatique du LPSC à Grenoble Comment protéger les systèmes et les données ? et est chargé de mission pour la sécurité informatique auprès de la direction de l’IN2P3 (18 labo- Grâce à des principes simples et à la mise en œuvre d’outils libres réputés pour ratoires de recherche, près de leur efficacité, on apprendra dans ce cahier à améliorer l’architecture d’un réseau trois mille utilisateurs). d’entreprise et à le protéger contre les intrusions, dénis de service et autres Bernard Boutherin attaques. On verra notamment comment filtrer des flux (netfilter/IPtables…), De formation universitaire, sécuriser la messagerie (milter-greylist, ClamAV…), chiffrer avec SSL (stunnel…) Benoit Delaunay travaille Benoit Delaunay et (Open)SSH. On étudiera les techniques et outils de surveillance (métrologie avec actuellement au Centre de Cal- MRTG, empreintes Tripwire, détection d’intrusion avec des outils tel Snort, créa- cul de l’IN2P3 (Institut National tion de tableaux de bord) et l’authentification unique (SSO) avec LDAP, Kerberos, de Physique Nucléaire et de PAM, les certificats X509 et les PKI… Physique des Particules). Il y est Linux administrateur système et ré- Linux seau en charge de la sécurité informatique.
    [Show full text]
  • Troubleshooting Guide
    Java Platform, Standard Edition Troubleshooting Guide Release 9 E61074-05 October 2017 Java Platform, Standard Edition Troubleshooting Guide, Release 9 E61074-05 Copyright © 1995, 2017, Oracle and/or its affiliates. All rights reserved. This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, then the following notice is applicable: U.S. GOVERNMENT END USERS: Oracle programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, delivered to U.S. Government end users are "commercial computer software" pursuant to the applicable Federal Acquisition Regulation and agency- specific supplemental regulations. As such, use, duplication, disclosure, modification, and adaptation of the programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, shall be subject to license terms and license restrictions applicable to the programs. No other rights are granted to the U.S.
    [Show full text]
  • Licensing Information User Manual Release 8.0 E65472-04
    Oracle® Communications Calendar Server Licensing Information User Manual Release 8.0 E65472-04 March 2021 Copyright © 2000, 2021, Oracle and/or its affiliates. All rights reserved. This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, then the following notice is applicable: U.S. GOVERNMENT END USERS: Oracle programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, delivered to U.S. Government end users are “commercial computer software” pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, use, duplication, disclosure, modification, and adaptation of the programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, shall be subject to license terms and license restrictions applicable to the programs. No other rights are granted to the U.S. Government.
    [Show full text]
  • Content Management (CMS) Lecture 02: Content Management Systems - Introduction Mariusz Trzaska, Ph
    Content Management (CMS) Lecture 02: Content Management Systems - introduction Mariusz Trzaska, Ph. D. [email protected], http:// www.mtrzaska.com Agenda Introduction CMS functionality Design of a CMS Classification and review of CMSs Summary Source : Wikipedia.com, Fragments of materials written by professor Kazimierz Subieta. Content management 2 Introduction Content Management System (CMS) Internet portal (Wikipedia): the kind of information service for which the Internet is a medium. Typically, a web portal includes news, weather, web directory, chat and search functionality. Content management 3 Introduction (2) Polish portals o Wirtualna Polska – first portal in Poland o Onet.pl o Gazeta.pl o o2.pl Foreign portals o Yahoo o AOL Content management 4 Introduction (3) Vortal – special kind of a portal, publishing information thematically similar to each other Wikipedia Examples o Theatrical vortal : http://www.e-teatr.pl/ o Sports vortal: http://new.sports.pl/ o Astronomical vortal : http://www.astronomia.pl/ o Treasure Hunter’s vortal: http://www.poszukiwania.pl o Software vortal: www.dobreprogramy.pl/ o Portals/ Vortals on Wikipedia: http://pl.wikipedia.org/wiki/Wikipedia:Wikiportale Content management 5 Creative chaos in the field of CMS Technological and market innovation and the possibility of earning big money cause the beginning of chaos. If A, B, C, formats are used for a given type of content, then a mapping A-B, B-A, A-C will be needed The lack of standards and incompatible solutions implies middleware, mostly based on the new format (see JSON, XML). The "two programmers in the garage" syndrome: the success of a micro-scale solution causes the bottom-up solution for the macro-scale to expand (see HTML, XML, ...).
    [Show full text]
  • Zip Plugin 1.1 Read and Write Zip Archives with Hollywood
    Zip Plugin 1.1 Read and write zip archives with Hollywood Andreas Falkenhahn i Table of Contents 1 General information::::::::::::::::::::::::::::: 1 1.1 Introduction :::::::::::::::::::::::::::::::::::::::::::::::::::: 1 1.2 Terms and conditions ::::::::::::::::::::::::::::::::::::::::::: 1 1.3 Requirements::::::::::::::::::::::::::::::::::::::::::::::::::: 2 1.4 Installation ::::::::::::::::::::::::::::::::::::::::::::::::::::: 2 2 About zip.hwp ::::::::::::::::::::::::::::::::::: 3 2.1 Credits ::::::::::::::::::::::::::::::::::::::::::::::::::::::::: 3 2.2 Frequently asked questions:::::::::::::::::::::::::::::::::::::: 3 2.3 Known issues ::::::::::::::::::::::::::::::::::::::::::::::::::: 3 2.4 Future:::::::::::::::::::::::::::::::::::::::::::::::::::::::::: 3 2.5 History ::::::::::::::::::::::::::::::::::::::::::::::::::::::::: 3 3 Usage ::::::::::::::::::::::::::::::::::::::::::::: 5 3.1 Activating the plugin ::::::::::::::::::::::::::::::::::::::::::: 5 3.2 Zip archives as directories::::::::::::::::::::::::::::::::::::::: 5 3.3 Extracting files ::::::::::::::::::::::::::::::::::::::::::::::::: 6 3.4 Zip archive basics::::::::::::::::::::::::::::::::::::::::::::::: 6 3.5 Creating zip archives ::::::::::::::::::::::::::::::::::::::::::: 7 3.6 Linking files :::::::::::::::::::::::::::::::::::::::::::::::::::: 7 4 Function reference::::::::::::::::::::::::::::::: 9 4.1 zip.AddDirectory ::::::::::::::::::::::::::::::::::::::::::::::: 9 4.2 zip.AddFile::::::::::::::::::::::::::::::::::::::::::::::::::::: 9 4.3 zip.CloseArchive:::::::::::::::::::::::::::::::::::::::::::::::
    [Show full text]
  • BCIS 1305 Business Computer Applications
    BCIS 1305 Business Computer Applications BCIS 1305 Business Computer Applications San Jacinto College This course was developed from generally available open educational resources (OER) in use at multiple institutions, drawing mostly from a primary work curated by the Extended Learning Institute (ELI) at Northern Virginia Community College (NOVA), but also including additional open works from various sources as noted in attributions on each page of materials. Cover Image: “Keyboard” by John Ward from https://flic.kr/p/tFuRZ licensed under a Creative Commons Attribution License. BCIS 1305 Business Computer Applications by Extended Learning Institute (ELI) at NOVA is licensed under a Creative Commons Attribution 4.0 International License, except where otherwise noted. CONTENTS Module 1: Introduction to Computers ..........................................................................................1 • Reading: File systems ....................................................................................................................................... 1 • Reading: Basic Computer Skills ........................................................................................................................ 1 • Reading: Computer Concepts ........................................................................................................................... 1 • Tutorials: Computer Basics................................................................................................................................ 1 Module 2: Computer
    [Show full text]
  • Pipenightdreams Osgcal-Doc Mumudvb Mpg123-Alsa Tbb
    pipenightdreams osgcal-doc mumudvb mpg123-alsa tbb-examples libgammu4-dbg gcc-4.1-doc snort-rules-default davical cutmp3 libevolution5.0-cil aspell-am python-gobject-doc openoffice.org-l10n-mn libc6-xen xserver-xorg trophy-data t38modem pioneers-console libnb-platform10-java libgtkglext1-ruby libboost-wave1.39-dev drgenius bfbtester libchromexvmcpro1 isdnutils-xtools ubuntuone-client openoffice.org2-math openoffice.org-l10n-lt lsb-cxx-ia32 kdeartwork-emoticons-kde4 wmpuzzle trafshow python-plplot lx-gdb link-monitor-applet libscm-dev liblog-agent-logger-perl libccrtp-doc libclass-throwable-perl kde-i18n-csb jack-jconv hamradio-menus coinor-libvol-doc msx-emulator bitbake nabi language-pack-gnome-zh libpaperg popularity-contest xracer-tools xfont-nexus opendrim-lmp-baseserver libvorbisfile-ruby liblinebreak-doc libgfcui-2.0-0c2a-dbg libblacs-mpi-dev dict-freedict-spa-eng blender-ogrexml aspell-da x11-apps openoffice.org-l10n-lv openoffice.org-l10n-nl pnmtopng libodbcinstq1 libhsqldb-java-doc libmono-addins-gui0.2-cil sg3-utils linux-backports-modules-alsa-2.6.31-19-generic yorick-yeti-gsl python-pymssql plasma-widget-cpuload mcpp gpsim-lcd cl-csv libhtml-clean-perl asterisk-dbg apt-dater-dbg libgnome-mag1-dev language-pack-gnome-yo python-crypto svn-autoreleasedeb sugar-terminal-activity mii-diag maria-doc libplexus-component-api-java-doc libhugs-hgl-bundled libchipcard-libgwenhywfar47-plugins libghc6-random-dev freefem3d ezmlm cakephp-scripts aspell-ar ara-byte not+sparc openoffice.org-l10n-nn linux-backports-modules-karmic-generic-pae
    [Show full text]
  • Implementación De MAS En Sistemas Embebidos
    ImplementaciImplementacióónn dede MASMAS enen SistemasSistemas EmbebidosEmbebidos Francisco Sivianes Castillo ÍÍndicendice Definiendo algunos términos Nuestro escenario de trabajo Niveles de sistemas de procesamiento Pruebas Conclusiones 02/07/2009 MAS en Sistemas Embebidos 2 DefiniendoDefiniendo algunosalgunos ttéérminosrminos Microprocesador – (RAE) 1. m. Fís. Circuito constituido por millares de transistores integrados en un chip, que realiza alguna determinada función de los computadores electrónicos digitales. – (María Moliner) m. Inform. Circuito Integrado que constituye la unidad central de procesamiento de un microordenador. • Microordenador m. Inform. Ordenador de pequeño tamaño que contiene un microprocesador. Microcontrolador – (RAE) No existe entrada para este término. – (María Moliner) No existe entrada para este término. 02/07/2009 MAS en Sistemas Embebidos 3 DefiniendoDefiniendo algunosalgunos ttéérminosrminos Microprocesador – El microprocesador está unido al concepto lógico de CPU. Una CPU puede estar soportada por uno o varios microprocesadores, y un microprocesador puede soportar una o varias CPU. Un núcleo suele referirse a una porción del procesador que realiza todas las actividades de una CPU real. – El microprocesador está compuesto básicamente por: varios registros; una Unidad de control, una Unidad aritmético-lógica; y dependiendo del procesador, puede contener una unidad en coma flotante. Microcontrolador – Un microcontrolador es un circuito integrado o chip que incluye en su interior las tres unidades
    [Show full text]
  • PC Hardware Contents
    PC Hardware Contents 1 Computer hardware 1 1.1 Von Neumann architecture ...................................... 1 1.2 Sales .................................................. 1 1.3 Different systems ........................................... 2 1.3.1 Personal computer ...................................... 2 1.3.2 Mainframe computer ..................................... 3 1.3.3 Departmental computing ................................... 4 1.3.4 Supercomputer ........................................ 4 1.4 See also ................................................ 4 1.5 References ............................................... 4 1.6 External links ............................................. 4 2 Central processing unit 5 2.1 History ................................................. 5 2.1.1 Transistor and integrated circuit CPUs ............................ 6 2.1.2 Microprocessors ....................................... 7 2.2 Operation ............................................... 8 2.2.1 Fetch ............................................. 8 2.2.2 Decode ............................................ 8 2.2.3 Execute ............................................ 9 2.3 Design and implementation ...................................... 9 2.3.1 Control unit .......................................... 9 2.3.2 Arithmetic logic unit ..................................... 9 2.3.3 Integer range ......................................... 10 2.3.4 Clock rate ........................................... 10 2.3.5 Parallelism .........................................
    [Show full text]