Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.1.10.2022.0345
Kategorie:Mageia Linux Local Security Checks
Titel:Mageia: Security Advisory (MGASA-2022-0345)
Zusammenfassung:The remote host is missing an update for the 'tcpreplay' package(s) announced via the MGASA-2022-0345 advisory.
Beschreibung:Summary:
The remote host is missing an update for the 'tcpreplay' package(s) announced via the MGASA-2022-0345 advisory.

Vulnerability Insight:
tcprewrite in Tcpreplay 4.4.1 has a reachable assertion in get_layer4_v6
in common/get.c. (CVE-2022-27939)

tcprewrite in Tcpreplay 4.4.1 has a heap-based buffer over-read in
get_ipv6_next in common/get.c. (CVE-2022-27940)

tcprewrite in Tcpreplay 4.4.1 has a heap-based buffer over-read in
get_l2len_protocol in common/get.c. (CVE-2022-27941)

tcpprep in Tcpreplay 4.4.1 has a heap-based buffer over-read in parse_mpls
in common/get.c. (CVE-2022-27942)

Tcpreplay version 4.4.1 contains a memory leakage flaw in
fix_ipv6_checksums() function. The highest threat from this vulnerability
is to data confidentiality. (CVE-2022-28487)

The component tcprewrite in Tcpreplay v4.4.1 was discovered to contain a
heap-based buffer overflow in get_ipv6_next at common/get.c:713.
(CVE-2022-37047)

The component tcprewrite in Tcpreplay v4.4.1 was discovered to contain a
heap-based buffer overflow in get_l2len_protocol at common/get.c:344.
(CVE-2022-37048)

The component tcpprep in Tcpreplay v4.4.1 was discovered to contain a
heap-based buffer overflow in parse_mpls at common/get.c:150.
(CVE-2022-37049)

Affected Software/OS:
'tcpreplay' package(s) on Mageia 8.

Solution:
Please install the updated package(s).

CVSS Score:
6.8

CVSS Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2022-27939
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5B75AFRJUGOYHCFG2ZV2JKSUPA6MSCT5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ECRCFJ6X3IVB7BT4KS6AHQMSL532YXYD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JWRZO7BG6DHA5NAC3COB45WFXLYRIERC/
https://security.gentoo.org/glsa/202210-08
https://github.com/appneta/tcpreplay/issues/717
Common Vulnerability Exposure (CVE) ID: CVE-2022-27940
https://github.com/appneta/tcpreplay/issues/718
Common Vulnerability Exposure (CVE) ID: CVE-2022-27941
https://github.com/appneta/tcpreplay/issues/716
Common Vulnerability Exposure (CVE) ID: CVE-2022-27942
https://github.com/appneta/tcpreplay/issues/719
Common Vulnerability Exposure (CVE) ID: CVE-2022-28487
https://github.com/appneta/tcpreplay/issues/723
https://github.com/appneta/tcpreplay/pull/720
Common Vulnerability Exposure (CVE) ID: CVE-2022-37047
https://github.com/appneta/tcpreplay/issues/734
Common Vulnerability Exposure (CVE) ID: CVE-2022-37048
https://github.com/appneta/tcpreplay/issues/735
Common Vulnerability Exposure (CVE) ID: CVE-2022-37049
https://github.com/appneta/tcpreplay/issues/736
CopyrightCopyright (C) 2022 Greenbone AG

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.