Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.63966
Kategorie:FreeBSD Local Security Checks
Titel:FreeBSD Ports: wireshark, wireshark-lite
Zusammenfassung:The remote host is missing an update to the system; as announced in the referenced advisory.
Beschreibung:Summary:
The remote host is missing an update to the system
as announced in the referenced advisory.

Vulnerability Insight:
The following packages are affected:

wireshark
wireshark-lite

CVE-2009-1210
Format string vulnerability in the PROFINET/DCP (PN-DCP) dissector in
Wireshark 1.0.6 and earlier allows remote attackers to execute
arbitrary code via a PN-DCP packet with format string specifiers in
the station name. NOTE: some of these details are obtained from third
party information.

CVE-2009-1268
The Check Point High-Availability Protocol (CPHAP) dissector in
Wireshark 0.9.6 through 1.0.6 allows remote attackers to cause a
denial of service (crash) via a crafted FWHA_MY_STATE packet.

CVE-2009-1269
Unspecified vulnerability in Wireshark 0.99.6 through 1.0.6 allows
remote attackers to cause a denial of service (crash) via a crafted
Tektronix .rf5 file.

Solution:
Update your system with the appropriate patches or
software upgrades.

CVSS Score:
10.0

CVSS Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2009-1210
BugTraq ID: 34291
http://www.securityfocus.com/bid/34291
Bugtraq: 20090417 rPSA-2009-0062-1 tshark wireshark (Google Search)
http://www.securityfocus.com/archive/1/502745/100/0/threaded
Debian Security Information: DSA-1785 (Google Search)
http://www.debian.org/security/2009/dsa-1785
https://www.exploit-db.com/exploits/8308
https://www.redhat.com/archives/fedora-package-announce/2009-May/msg00675.html
https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01167.html
https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01213.html
http://www.mandriva.com/security/advisories?name=MDVSA-2009:088
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5976
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9526
http://www.redhat.com/support/errata/RHSA-2009-1100.html
http://secunia.com/advisories/34542
http://secunia.com/advisories/34778
http://secunia.com/advisories/34970
http://secunia.com/advisories/35133
http://secunia.com/advisories/35224
http://secunia.com/advisories/35416
http://secunia.com/advisories/35464
SuSE Security Announcement: SUSE-SR:2009:011 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00003.html
XForce ISS Database: wireshark-pndcp-format-string(49512)
https://exchange.xforce.ibmcloud.com/vulnerabilities/49512
Common Vulnerability Exposure (CVE) ID: CVE-2009-1268
BugTraq ID: 34457
http://www.securityfocus.com/bid/34457
Debian Security Information: DSA-1942 (Google Search)
http://www.debian.org/security/2009/dsa-1942
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=3269
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10876
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5335
http://www.securitytracker.com/id?1022027
http://secunia.com/advisories/37477
XForce ISS Database: wireshark-cphap-dos(49815)
https://exchange.xforce.ibmcloud.com/vulnerabilities/49815
Common Vulnerability Exposure (CVE) ID: CVE-2009-1269
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10642
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5748
XForce ISS Database: wireshark-rf5file-dos(49816)
https://exchange.xforce.ibmcloud.com/vulnerabilities/49816
CopyrightCopyright (C) 2009 E-Soft Inc.

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.