English | Deutsch | Español | Português
 Benutzerkennung:
 Passwort:
Registrieren
 About:   Dediziert  | Erweitert  | Standard  | Wiederkehrend  | Risikolos  | Desktop  | Basis  | Einmalig  | Sicherheits Siegel  | FAQ
  Preis/Funktionszusammenfassung  | Bestellen  | Neue Anfälligkeiten  | Vertraulichkeit  | Anfälligkeiten Suche
 Anfälligkeitssuche        Suche in 75096 CVE Beschreibungen
und 39644 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.60233
Kategorie:Mandrake Local Security Checks
Titel:Mandrake Security Advisory MDVSA-2008:001-1 (wireshark)
Zusammenfassung:Mandrake Security Advisory MDVSA-2008:001-1 (wireshark)
Beschreibung:
The remote host is missing an update to wireshark
announced via advisory MDVSA-2008:001-1.

A number of vulnerabilities in the Wireshark program were found that
could cause crashes, excessive looping, or arbitrary code execution.

This update provides Wireshark 0.99.7 which is not vulnerable to
these issues.

An updated version of libsmi is also being provided, not because
of security issues, but because this version of wireshark uses it
instead of net-snmp for SNMP support.

Update:

This update is being reissued without libcap (kernel capabilities)
support, as that is not required by the original released packages,
and thus gave trouble for a number of users.

Affected: 2007.0, 2007.1, 2008.0, Corporate 4.0

Solution:
To upgrade automatically use MandrakeUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

http://www.securityspace.com/smysecure/catid.html?in=MDVSA-2008:001-1
http://www.wireshark.org/security/wnpa-sec-2007-03.html
http://qa.mandriva.com/show_bug.cgi?id=36470

Risk factor : Critical
Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2007-6111
Bugtraq: 20080103 rPSA-2008-0004-1 tshark wireshark (Google Search)
http://www.securityfocus.com/archive/1/archive/1/485792/100/0/threaded
http://bugs.gentoo.org/show_bug.cgi?id=199958
https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00606.html
https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00712.html
http://security.gentoo.org/glsa/glsa-200712-23.xml
http://www.mandriva.com/security/advisories?name=MDVSA-2008:001
http://www.mandriva.com/security/advisories?name=MDVSA-2008:1
http://www.redhat.com/support/errata/RHSA-2008-0058.html
SuSE Security Announcement: SUSE-SR:2008:004 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00008.html
BugTraq ID: 26532
http://www.securityfocus.com/bid/26532
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9048
http://www.vupen.com/english/advisories/2007/3956
http://securitytracker.com/id?1018988
http://secunia.com/advisories/27777
http://secunia.com/advisories/28197
http://secunia.com/advisories/28288
http://secunia.com/advisories/28304
http://secunia.com/advisories/28207
http://secunia.com/advisories/28325
http://secunia.com/advisories/28564
http://secunia.com/advisories/29048
Common Vulnerability Exposure (CVE) ID: CVE-2007-6112
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9772
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:14561
Common Vulnerability Exposure (CVE) ID: CVE-2007-6113
Bugtraq: 20070904 Wireshark DNP3 Dissector Infinite Loop Vulnerability (Google Search)
http://www.securityfocus.com/archive/1/archive/1/478497/100/0/threaded
http://www.milw0rm.com/exploits/4347
http://www.securiteam.com/securitynews/5LP0V00MAI.html
http://www.redhat.com/support/errata/RHSA-2008-0059.html
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9841
http://www.securitytracker.com/id?1018635
http://secunia.com/advisories/28583
http://securityreason.com/securityalert/3095
XForce ISS Database: wireshark-dnp3-dos(36392)
http://xforce.iss.net/xforce/xfdb/36392
Common Vulnerability Exposure (CVE) ID: CVE-2007-6114
Debian Security Information: DSA-1414 (Google Search)
http://www.debian.org/security/2007/dsa-1414
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10708
http://secunia.com/advisories/27817
Common Vulnerability Exposure (CVE) ID: CVE-2007-6115
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9726
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:14578
Common Vulnerability Exposure (CVE) ID: CVE-2007-6116
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9799
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:15036
Common Vulnerability Exposure (CVE) ID: CVE-2007-6117
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11508
Common Vulnerability Exposure (CVE) ID: CVE-2007-6118
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10659
Common Vulnerability Exposure (CVE) ID: CVE-2007-6119
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9880
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:14721
Common Vulnerability Exposure (CVE) ID: CVE-2007-6120
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9488
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:14802
Common Vulnerability Exposure (CVE) ID: CVE-2007-6121
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11374
Common Vulnerability Exposure (CVE) ID: CVE-2007-6438
BugTraq ID: 27071
http://www.securityfocus.com/bid/27071
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11785
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:14734
XForce ISS Database: wireshark-smb-dissector-dos(39178)
http://xforce.iss.net/xforce/xfdb/39178
Common Vulnerability Exposure (CVE) ID: CVE-2007-6439
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10331
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:15002
XForce ISS Database: wireshark-ipv6-dissector-dos(39180)
http://xforce.iss.net/xforce/xfdb/39180
XForce ISS Database: wireshark-usb-dissector-dos(39181)
http://xforce.iss.net/xforce/xfdb/39181
Common Vulnerability Exposure (CVE) ID: CVE-2007-6441
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10452
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:14126
XForce ISS Database: wireshark-wimax-dissector-dos(39183)
http://xforce.iss.net/xforce/xfdb/39183
Common Vulnerability Exposure (CVE) ID: CVE-2007-6450
Debian Security Information: DSA-1446 (Google Search)
http://www.debian.org/security/2008/dsa-1446
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11442
http://secunia.com/advisories/28315
XForce ISS Database: wireshark-rpl-dissector-dos(39186)
http://xforce.iss.net/xforce/xfdb/39186
Common Vulnerability Exposure (CVE) ID: CVE-2007-6451
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9685
XForce ISS Database: wireshark-cip-dissector-dos(39187)
http://xforce.iss.net/xforce/xfdb/39187
CopyrightCopyright (c) 2008 E-Soft Inc. http://www.securityspace.com

Dies ist nur einer von 39644 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.

Registrierung eines neuen Benutzers
Email:
Benutzerkennung:
Passwort:
Bitte schicken Sie mir den monatlichen Newsletter, der mich über die neuesten Services, Verbesserungen und Umfragen informiert.
Bitte schicken Sie mir eine Anfälligkeitstest Benachrichtigung, wenn ein neuer Test hinzugefügt wird.
   Datenschutz
Anmeldung für registrierte Benutzer
 
Benutzerkennung:   
Passwort:  

 Benutzerkennung oder Passwort vergessen?
Email/Benutzerkennung:




Startseite | Über uns | Kontakt | Partnerprogramme | Datenschutz | Mailinglisten | Missbrauch
Sicherheits Überprüfungen | Verwaltete DNS | Netzwerk Überwachung | Webseiten Analysator | Internet Recherche Berichte
Web Sonde | Whois

© 1998-2014 E-Soft Inc. Alle Rechte vorbehalten.