Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.69196
Kategorie:Red Hat Local Security Checks
Titel:RedHat Security Advisory RHSA-2010:0924
Zusammenfassung:NOSUMMARY
Beschreibung:Description:
The remote host is missing updates announced in
advisory RHSA-2010:0924.

Wireshark is a program for monitoring network traffic. Wireshark was
previously known as Ethereal.

A heap-based buffer overflow flaw was found in the Wireshark Local Download
Sharing Service (LDSS) dissector. If Wireshark read a malformed packet off
a network or opened a malicious dump file, it could crash or, possibly,
execute arbitrary code as the user running Wireshark. (CVE-2010-4300)

A denial of service flaw was found in Wireshark. Wireshark could crash or
stop responding if it read a malformed packet off a network, or opened a
malicious dump file. (CVE-2010-3445)

Users of Wireshark should upgrade to these updated packages, which contain
Wireshark version 1.2.13, and resolve these issues. All running instances
of Wireshark must be restarted for the update to take effect.

Solution:
Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date

http://rhn.redhat.com/errata/RHSA-2010-0924.html
http://www.redhat.com/security/updates/classification/#moderate
http://www.wireshark.org/security/wnpa-sec-2010-13.html
http://www.wireshark.org/security/wnpa-sec-2010-12.html

Risk factor : High

CVSS Score:
7.5

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2010-3445
20100913 Wireshark 1.4.0 Malformed SNMP V1 Packet Denial of Service
http://archives.neohapsis.com/archives/bugtraq/2010-09/0088.html
42392
http://secunia.com/advisories/42392
42411
http://secunia.com/advisories/42411
42877
http://secunia.com/advisories/42877
43068
http://secunia.com/advisories/43068
43197
http://www.securityfocus.com/bid/43197
43759
http://secunia.com/advisories/43759
43821
http://secunia.com/advisories/43821
ADV-2010-3067
http://www.vupen.com/english/advisories/2010/3067
ADV-2010-3093
http://www.vupen.com/english/advisories/2010/3093
ADV-2011-0076
http://www.vupen.com/english/advisories/2011/0076
ADV-2011-0212
http://www.vupen.com/english/advisories/2011/0212
ADV-2011-0404
http://www.vupen.com/english/advisories/2011/0404
ADV-2011-0626
http://www.vupen.com/english/advisories/2011/0626
ADV-2011-0719
http://www.vupen.com/english/advisories/2011/0719
DSA-2127
http://www.debian.org/security/2010/dsa-2127
FEDORA-2011-2620
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055664.html
FEDORA-2011-2632
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055650.html
FEDORA-2011-2648
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055364.html
MDVSA-2010:200
http://www.mandriva.com/security/advisories?name=MDVSA-2010:200
RHSA-2010:0924
http://www.redhat.com/support/errata/RHSA-2010-0924.html
RHSA-2011:0370
http://www.redhat.com/support/errata/RHSA-2011-0370.html
SUSE-SR:2011:001
http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00003.html
SUSE-SR:2011:002
http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html
VU#215900
http://www.kb.cert.org/vuls/id/215900
[oss-security] 20101001 Re: CVE requests: Poppler, Quassel, Pyfribidi, Overkill, DocUtils, FireGPG, Wireshark
http://www.openwall.com/lists/oss-security/2010/10/01/10
[oss-security] 20101011 Re: CVE requests: Poppler, Quassel, Pyfribidi, Overkill, DocUtils, FireGPG, Wireshark
http://www.openwall.com/lists/oss-security/2010/10/12/1
http://blogs.sun.com/security/entry/resource_management_errors_vulnerability_in
http://www.wireshark.org/security/wnpa-sec-2010-12.html
http://xorl.wordpress.com/2010/10/15/cve-2010-3445-wireshark-asn-1-ber-stack-overflow/
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5230
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-3445
oval:org.mitre.oval:def:14607
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14607
Common Vulnerability Exposure (CVE) ID: CVE-2010-4300
BugTraq ID: 44987
http://www.securityfocus.com/bid/44987
http://www.exploit-db.com/exploits/15676
http://www.mandriva.com/security/advisories?name=MDVSA-2010:242
http://osvdb.org/69354
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14287
http://www.securitytracker.com/id?1024762
http://secunia.com/advisories/42290
SuSE Security Announcement: SUSE-SR:2011:001 (Google Search)
SuSE Security Announcement: SUSE-SR:2011:002 (Google Search)
http://www.vupen.com/english/advisories/2010/3038
http://www.vupen.com/english/advisories/2010/3068
CopyrightCopyright (c) 2011 E-Soft Inc. http://www.securityspace.com

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.