Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.52195
Kategorie:FreeBSD Local Security Checks
Titel:FreeBSD Ports: ethereal, ethereal-lite, tethereal, tethereal-lite
Zusammenfassung:The remote host is missing an update to the system; as announced in the referenced advisory.
Beschreibung:Summary:
The remote host is missing an update to the system
as announced in the referenced advisory.

Vulnerability Insight:
The following packages are affected:

ethereal
ethereal-lite
tethereal
tethereal-lite

CVE-2005-0006
The COPS dissector in Ethereal 0.10.6 through 0.10.8 allows remote
attackers to cause a denial of service (infinite loop).

CVE-2005-0007
Unknown vulnerability in the DLSw dissector in Ethereal 0.10.6 through
0.10.8 allows remote attackers to cause a denial of service
(application crash from assertion).

CVE-2005-0008
Unknown vulnerability in the DNP dissector in Ethereal 0.10.5 through
0.10.8 allows remote attackers to cause 'memory corruption.'

CVE-2005-0009
Unknown vulnerability in the Gnutella dissector in Ethereal 0.10.6
through 0.10.8 allows remote attackers to cause a denial of service
(application crash).

CVE-2005-0010
Unknown vulnerability in the MMSE dissector in Ethereal 0.10.4 through
0.10.8 allows remote attackers to cause a denial of service by
triggering a free of statically allocated memory.

CVE-2005-0084
Buffer overflow in the X11 dissector in Ethereal 0.8.10 through 0.10.8
allows remote attackers to execute arbitrary code via a crafted
packet.

Solution:
Update your system with the appropriate patches or
software upgrades.

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2005-0006
BugTraq ID: 12326
http://www.securityfocus.com/bid/12326
Computer Incident Advisory Center Bulletin: P-106
http://www.ciac.org/ciac/bulletins/p-106.shtml
http://www.redhat.com/archives/fedora-legacy-announce/2006-January/msg00003.html
http://www.gentoo.org/security/en/glsa/glsa-200501-27.xml
http://www.mandriva.com/security/advisories?name=MDKSA-2005:013
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10801
http://www.redhat.com/support/errata/RHSA-2005-011.html
http://www.redhat.com/support/errata/RHSA-2005-037.html
http://secunia.com/advisories/13946/
XForce ISS Database: ethereal-cops-dos(18999)
https://exchange.xforce.ibmcloud.com/vulnerabilities/18999
Common Vulnerability Exposure (CVE) ID: CVE-2005-0007
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11381
XForce ISS Database: ethereal-dlsw-dos(19000)
https://exchange.xforce.ibmcloud.com/vulnerabilities/19000
Common Vulnerability Exposure (CVE) ID: CVE-2005-0008
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10689
XForce ISS Database: ethereal-dnp-memory-corruption(19001)
https://exchange.xforce.ibmcloud.com/vulnerabilities/19001
Common Vulnerability Exposure (CVE) ID: CVE-2005-0009
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10623
XForce ISS Database: ethereal-gnutella-dos(19002)
https://exchange.xforce.ibmcloud.com/vulnerabilities/19002
Common Vulnerability Exposure (CVE) ID: CVE-2005-0010
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9521
XForce ISS Database: ethereal-mmse-free-memory(19003)
https://exchange.xforce.ibmcloud.com/vulnerabilities/19003
Common Vulnerability Exposure (CVE) ID: CVE-2005-0084
Debian Security Information: DSA-653 (Google Search)
http://www.debian.org/security/2005/dsa-653
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9140
XForce ISS Database: ethereal-x11-bo(19004)
https://exchange.xforce.ibmcloud.com/vulnerabilities/19004
CopyrightCopyright (C) 2008 E-Soft Inc.

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.