![]() |
Startseite ▼ Bookkeeping
Online ▼ Sicherheits
Überprüfungs ▼
Verwaltetes
DNS ▼
Info
Bestellen/Erneuern
FAQ
AUP
Dynamic DNS Clients
Domaine konfigurieren Dyanmic DNS Update Password Netzwerk
Überwachung ▼
Enterprise
Erweiterte
Standard
Gratis Test
FAQ
Preis/Funktionszusammenfassung
Bestellen
Beispiele
Konfigurieren/Status Alarm Profile | ||
Test Kennung: | 1.3.6.1.4.1.25623.1.0.51482 |
Kategorie: | Conectiva Local Security Checks |
Titel: | Conectiva Security Advisory CLA-2003:780 |
Zusammenfassung: | NOSUMMARY |
Beschreibung: | Description: The remote host is missing updates announced in advisory CLA-2003:780. Ethereal[1] is a powerful network traffic analyzer with a graphical user interface (GUI). This update announcement addresses several vulnerabilities[2] in ethereal versions prior to 0.9.16. These vulnerabilities can be exploited by an attacker who can insert crafted packets in the wire being monitored by ethereal or make an user open a trace file with such packets inside. Successful exploitation of these vulnerabilities can lead to denial of service conditions and/or remote execution of arbitrary code. The following vulnerabilities have been fixed in the 0.9.16 version: - buffer overflow in the GTP protocol dissector (CVE-2003-0925)[3] - denial of service with ISAKMP or MEGACO packets (CVE-2003-0926)[4] - buffer overflow in the SOCKS protocol dissector (CVE-2003-0927)[5] Solution: The apt tool can be used to perform RPM package upgrades by running 'apt-get update' followed by 'apt-get upgrade' http://www.securityspace.com/smysecure/catid.html?in=CLA-2003:780 http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=002003 Risk factor : High CVSS Score: 7.5 |
Querverweis: |
Common Vulnerability Exposure (CVE) ID: CVE-2003-0925 BugTraq ID: 8951 http://www.securityfocus.com/bid/8951 Conectiva Linux advisory: CLA-2003:780 http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000780 Debian Security Information: DSA-407 (Google Search) http://www.debian.org/security/2003/dsa-407 http://www.mandriva.com/security/advisories?name=MDKSA-2003:114 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9692 http://www.redhat.com/support/errata/RHSA-2003-323.html http://www.redhat.com/support/errata/RHSA-2003-324.html http://secunia.com/advisories/10531 TurboLinux Advisory: TLSA-2003-64 http://www.turbolinux.com/security/TLSA-2003-64.txt Common Vulnerability Exposure (CVE) ID: CVE-2003-0926 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11648 Common Vulnerability Exposure (CVE) ID: CVE-2003-0927 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9691 XForce ISS Database: ethereal-socks-heap-overflow(13578) https://exchange.xforce.ibmcloud.com/vulnerabilities/13578 |
Copyright | Copyright (c) 2005 E-Soft Inc. http://www.securityspace.com |
Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus. Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten. |