![]() |
Startseite ▼ Bookkeeping
Online ▼ Sicherheits
Überprüfungs ▼
Verwaltetes
DNS ▼
Info
Bestellen/Erneuern
FAQ
AUP
Dynamic DNS Clients
Domaine konfigurieren Dyanmic DNS Update Password Netzwerk
Überwachung ▼
Enterprise
Erweiterte
Standard
Gratis Test
FAQ
Preis/Funktionszusammenfassung
Bestellen
Beispiele
Konfigurieren/Status Alarm Profile | ||
Test Kennung: | 1.3.6.1.4.1.25623.1.1.10.2022.0345 |
Kategorie: | Mageia Linux Local Security Checks |
Titel: | Mageia: Security Advisory (MGASA-2022-0345) |
Zusammenfassung: | The remote host is missing an update for the 'tcpreplay' package(s) announced via the MGASA-2022-0345 advisory. |
Beschreibung: | Summary: The remote host is missing an update for the 'tcpreplay' package(s) announced via the MGASA-2022-0345 advisory. Vulnerability Insight: tcprewrite in Tcpreplay 4.4.1 has a reachable assertion in get_layer4_v6 in common/get.c. (CVE-2022-27939) tcprewrite in Tcpreplay 4.4.1 has a heap-based buffer over-read in get_ipv6_next in common/get.c. (CVE-2022-27940) tcprewrite in Tcpreplay 4.4.1 has a heap-based buffer over-read in get_l2len_protocol in common/get.c. (CVE-2022-27941) tcpprep in Tcpreplay 4.4.1 has a heap-based buffer over-read in parse_mpls in common/get.c. (CVE-2022-27942) Tcpreplay version 4.4.1 contains a memory leakage flaw in fix_ipv6_checksums() function. The highest threat from this vulnerability is to data confidentiality. (CVE-2022-28487) The component tcprewrite in Tcpreplay v4.4.1 was discovered to contain a heap-based buffer overflow in get_ipv6_next at common/get.c:713. (CVE-2022-37047) The component tcprewrite in Tcpreplay v4.4.1 was discovered to contain a heap-based buffer overflow in get_l2len_protocol at common/get.c:344. (CVE-2022-37048) The component tcpprep in Tcpreplay v4.4.1 was discovered to contain a heap-based buffer overflow in parse_mpls at common/get.c:150. (CVE-2022-37049) Affected Software/OS: 'tcpreplay' package(s) on Mageia 8. Solution: Please install the updated package(s). CVSS Score: 6.8 CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P |
Querverweis: |
Common Vulnerability Exposure (CVE) ID: CVE-2022-27939 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5B75AFRJUGOYHCFG2ZV2JKSUPA6MSCT5/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ECRCFJ6X3IVB7BT4KS6AHQMSL532YXYD/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JWRZO7BG6DHA5NAC3COB45WFXLYRIERC/ https://security.gentoo.org/glsa/202210-08 https://github.com/appneta/tcpreplay/issues/717 Common Vulnerability Exposure (CVE) ID: CVE-2022-27940 https://github.com/appneta/tcpreplay/issues/718 Common Vulnerability Exposure (CVE) ID: CVE-2022-27941 https://github.com/appneta/tcpreplay/issues/716 Common Vulnerability Exposure (CVE) ID: CVE-2022-27942 https://github.com/appneta/tcpreplay/issues/719 Common Vulnerability Exposure (CVE) ID: CVE-2022-28487 https://github.com/appneta/tcpreplay/issues/723 https://github.com/appneta/tcpreplay/pull/720 Common Vulnerability Exposure (CVE) ID: CVE-2022-37047 https://github.com/appneta/tcpreplay/issues/734 Common Vulnerability Exposure (CVE) ID: CVE-2022-37048 https://github.com/appneta/tcpreplay/issues/735 Common Vulnerability Exposure (CVE) ID: CVE-2022-37049 https://github.com/appneta/tcpreplay/issues/736 |
Copyright | Copyright (C) 2022 Greenbone AG |
Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus. Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten. |