Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.61395
Kategorie:Gentoo Local Security Checks
Titel:Gentoo Security Advisory GLSA 200808-04 (wireshark)
Zusammenfassung:The remote host is missing updates announced in;advisory GLSA 200808-04.
Beschreibung:Summary:
The remote host is missing updates announced in
advisory GLSA 200808-04.

Vulnerability Insight:
Multiple Denial of Service vulnerabilities have been discovered in
Wireshark.

Solution:
All Wireshark users should upgrade to the latest version:

# emerge --sync
# emerge --ask --oneshot --verbose '>=net-analyzer/wireshark-1.0.2'

CVSS Score:
5.0

CVSS Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:P

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2008-3137
BugTraq ID: 30020
http://www.securityfocus.com/bid/30020
Bugtraq: 20080703 rPSA-2008-0212-1 tshark wireshark (Google Search)
http://www.securityfocus.com/archive/1/493882/100/0/threaded
Debian Security Information: DSA-1673 (Google Search)
http://www.debian.org/security/2008/dsa-1673
https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00544.html
http://security.gentoo.org/glsa/glsa-200808-04.xml
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10860
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15068
http://www.redhat.com/support/errata/RHSA-2008-0890.html
http://securitytracker.com/id?1020404
http://secunia.com/advisories/30886
http://secunia.com/advisories/30942
http://secunia.com/advisories/31085
http://secunia.com/advisories/31378
http://secunia.com/advisories/31687
http://secunia.com/advisories/32091
http://secunia.com/advisories/32944
SuSE Security Announcement: SUSE-SR:2008:017 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html
http://www.vupen.com/english/advisories/2008/1982/references
http://www.vupen.com/english/advisories/2008/2773
Common Vulnerability Exposure (CVE) ID: CVE-2008-3138
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10536
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14898
XForce ISS Database: wireshark-pana-kismet-dos(43519)
https://exchange.xforce.ibmcloud.com/vulnerabilities/43519
Common Vulnerability Exposure (CVE) ID: CVE-2008-3139
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14682
XForce ISS Database: wireshark-rtmpt-dos(43517)
https://exchange.xforce.ibmcloud.com/vulnerabilities/43517
Common Vulnerability Exposure (CVE) ID: CVE-2008-3140
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14700
XForce ISS Database: wireshark-syslog-dos(43518)
https://exchange.xforce.ibmcloud.com/vulnerabilities/43518
Common Vulnerability Exposure (CVE) ID: CVE-2008-3141
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11324
XForce ISS Database: wireshark-rmi-information-disclosure(43520)
https://exchange.xforce.ibmcloud.com/vulnerabilities/43520
Common Vulnerability Exposure (CVE) ID: CVE-2008-3145
BugTraq ID: 30181
http://www.securityfocus.com/bid/30181
Bugtraq: 20080729 rPSA-2008-0237-1 tshark wireshark (Google Search)
http://www.securityfocus.com/archive/1/494859/100/0/threaded
http://www.mandriva.com/security/advisories?name=MDVSA-2008:152
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9020
http://securitytracker.com/id?1020471
http://secunia.com/advisories/31044
http://secunia.com/advisories/31257
http://www.vupen.com/english/advisories/2008/2057/references
XForce ISS Database: wireshark-packets-dos(43719)
https://exchange.xforce.ibmcloud.com/vulnerabilities/43719
CopyrightCopyright (C) 2008 E-Soft Inc.

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.