Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.121416
Categoría:Gentoo Local Security Checks
Título:Gentoo Security Advisory GLSA 201510-03
Resumen:Gentoo Linux Local Security Checks GLSA 201510-03
Descripción:Summary:
Gentoo Linux Local Security Checks GLSA 201510-03

Vulnerability Insight:
Multiple vulnerabilities have been discovered in Wireshark. Please review the CVE identifiers referenced below for details.

Solution:
Update the affected packages to the latest available version.

CVSS Score:
7.8

CVSS Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:C

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2015-2187
BugTraq ID: 72940
http://www.securityfocus.com/bid/72940
https://security.gentoo.org/glsa/201510-03
http://www.securitytracker.com/id/1031858
SuSE Security Announcement: openSUSE-SU-2015:0489 (Google Search)
http://lists.opensuse.org/opensuse-updates/2015-03/msg00038.html
Common Vulnerability Exposure (CVE) ID: CVE-2015-2188
BugTraq ID: 72942
http://www.securityfocus.com/bid/72942
Debian Security Information: DSA-3210 (Google Search)
http://www.debian.org/security/2015/dsa-3210
http://www.mandriva.com/security/advisories?name=MDVSA-2015:183
Common Vulnerability Exposure (CVE) ID: CVE-2015-2189
BugTraq ID: 72944
http://www.securityfocus.com/bid/72944
RedHat Security Advisories: RHSA-2015:1460
http://rhn.redhat.com/errata/RHSA-2015-1460.html
Common Vulnerability Exposure (CVE) ID: CVE-2015-2190
BugTraq ID: 72938
http://www.securityfocus.com/bid/72938
Common Vulnerability Exposure (CVE) ID: CVE-2015-2191
BugTraq ID: 72941
http://www.securityfocus.com/bid/72941
Common Vulnerability Exposure (CVE) ID: CVE-2015-2192
BugTraq ID: 72937
http://www.securityfocus.com/bid/72937
Common Vulnerability Exposure (CVE) ID: CVE-2015-3182
1032279
http://www.securitytracker.com/id/1032279
74586
http://www.securityfocus.com/bid/74586
GLSA-201510-03
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
https://bugzilla.redhat.com/show_bug.cgi?id=1219409
https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=373deb5f4182a5c4ab8c8418a7bbaa5d6e72bb05
Common Vulnerability Exposure (CVE) ID: CVE-2015-3808
BugTraq ID: 74628
http://www.securityfocus.com/bid/74628
Common Vulnerability Exposure (CVE) ID: CVE-2015-3809
BugTraq ID: 74632
http://www.securityfocus.com/bid/74632
Debian Security Information: DSA-3277 (Google Search)
http://www.debian.org/security/2015/dsa-3277
Common Vulnerability Exposure (CVE) ID: CVE-2015-3810
BugTraq ID: 74629
http://www.securityfocus.com/bid/74629
Common Vulnerability Exposure (CVE) ID: CVE-2015-3811
RedHat Security Advisories: RHSA-2017:0631
http://rhn.redhat.com/errata/RHSA-2017-0631.html
Common Vulnerability Exposure (CVE) ID: CVE-2015-3812
BugTraq ID: 74637
http://www.securityfocus.com/bid/74637
Common Vulnerability Exposure (CVE) ID: CVE-2015-3813
BugTraq ID: 74633
http://www.securityfocus.com/bid/74633
Common Vulnerability Exposure (CVE) ID: CVE-2015-3814
BugTraq ID: 74631
http://www.securityfocus.com/bid/74631
Common Vulnerability Exposure (CVE) ID: CVE-2015-3815
BugTraq ID: 74630
http://www.securityfocus.com/bid/74630
https://blog.fuzzing-project.org/11-Read-heap-overflow-invalid-memory-access-in-Wireshark-TFPA-0072015.html
Common Vulnerability Exposure (CVE) ID: CVE-2015-3906
BugTraq ID: 74837
http://www.securityfocus.com/bid/74837
Common Vulnerability Exposure (CVE) ID: CVE-2015-4651
BugTraq ID: 75317
http://www.securityfocus.com/bid/75317
Debian Security Information: DSA-3294 (Google Search)
http://www.debian.org/security/2015/dsa-3294
http://www.securitytracker.com/id/1032662
SuSE Security Announcement: openSUSE-SU-2015:1215 (Google Search)
http://lists.opensuse.org/opensuse-updates/2015-07/msg00020.html
Common Vulnerability Exposure (CVE) ID: CVE-2015-4652
BugTraq ID: 75316
http://www.securityfocus.com/bid/75316
CopyrightCopyright (C) 2015 Eero Volotinen

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.