Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.800396
Kategorie:Denial of Service
Titel:Wireshark Multiple Unspecified Vulnerabilities (Apr 2009) - Windows
Zusammenfassung:Wireshark is prone to multiple unspecified vulnerabilities.
Beschreibung:Summary:
Wireshark is prone to multiple unspecified vulnerabilities.

Vulnerability Insight:
- Error exists while processing PN-DCP packet with format string specifiers
in PROFINET/DCP (PN-DCP) dissector.

- Error in unknown impact and attack vectors.

- Error in Lightweight Directory Access Protocol (LDAP) dissector when
processing unknown attack vectors.

- Error in Check Point High-Availability Protocol (CPHAP) when processing
crafted FWHA_MY_STATE packet.

- An error exists while processing malformed Tektronix .rf5 file.

Vulnerability Impact:
Successful exploitation could result in denial of service condition.

Affected Software/OS:
Wireshark version 0.9.6 to 1.0.6 on Windows

Solution:
Upgrade to Wireshark 1.0.7.

CVSS Score:
10.0

CVSS Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2009-1210
BugTraq ID: 34291
http://www.securityfocus.com/bid/34291
Bugtraq: 20090417 rPSA-2009-0062-1 tshark wireshark (Google Search)
http://www.securityfocus.com/archive/1/502745/100/0/threaded
Debian Security Information: DSA-1785 (Google Search)
http://www.debian.org/security/2009/dsa-1785
https://www.exploit-db.com/exploits/8308
https://www.redhat.com/archives/fedora-package-announce/2009-May/msg00675.html
https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01167.html
https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01213.html
http://www.mandriva.com/security/advisories?name=MDVSA-2009:088
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5976
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9526
http://www.redhat.com/support/errata/RHSA-2009-1100.html
http://secunia.com/advisories/34542
http://secunia.com/advisories/34778
http://secunia.com/advisories/34970
http://secunia.com/advisories/35133
http://secunia.com/advisories/35224
http://secunia.com/advisories/35416
http://secunia.com/advisories/35464
SuSE Security Announcement: SUSE-SR:2009:011 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00003.html
XForce ISS Database: wireshark-pndcp-format-string(49512)
https://exchange.xforce.ibmcloud.com/vulnerabilities/49512
Common Vulnerability Exposure (CVE) ID: CVE-2009-1266
XForce ISS Database: wireshark-unspecified(50334)
https://exchange.xforce.ibmcloud.com/vulnerabilities/50334
Common Vulnerability Exposure (CVE) ID: CVE-2009-1267
BugTraq ID: 34457
http://www.securityfocus.com/bid/34457
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6099
http://www.securitytracker.com/id?1022027
XForce ISS Database: wireshark-ldap-home-dos(49814)
https://exchange.xforce.ibmcloud.com/vulnerabilities/49814
Common Vulnerability Exposure (CVE) ID: CVE-2009-1268
Debian Security Information: DSA-1942 (Google Search)
http://www.debian.org/security/2009/dsa-1942
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=3269
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10876
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5335
http://secunia.com/advisories/37477
XForce ISS Database: wireshark-cphap-dos(49815)
https://exchange.xforce.ibmcloud.com/vulnerabilities/49815
Common Vulnerability Exposure (CVE) ID: CVE-2009-1269
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10642
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5748
XForce ISS Database: wireshark-rf5file-dos(49816)
https://exchange.xforce.ibmcloud.com/vulnerabilities/49816
CopyrightCopyright (C) 2009 Greenbone AG

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.