![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.53015 |
Categoría: | FreeBSD Local Security Checks |
Título: | FreeBSD Security Advisory (FreeBSD-SA-05:10.tcpdump.asc) |
Resumen: | The remote host is missing an update to the system; as announced in the referenced advisory FreeBSD-SA-05:10.tcpdump.asc |
Descripción: | Summary: The remote host is missing an update to the system as announced in the referenced advisory FreeBSD-SA-05:10.tcpdump.asc Vulnerability Insight: The tcpdump utility is used to capture and examine network traffic. Several tcpdump protocol decoders contain programming errors which can cause them to go into infinite loops. Solution: Upgrade your system to the appropriate stable release or security branch dated after the correction date. CVSS Score: 5.0 CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2005-1267 13906 http://www.securityfocus.com/bid/13906 15634 http://secunia.com/advisories/15634/ 17118 http://secunia.com/advisories/17118 2005-0028 http://www.trustix.org/errata/2005/0028/ DSA-854 http://www.debian.org/security/2005/dsa-854 FEDORA-2005-406 http://www.redhat.com/archives/fedora-announce-list/2005-June/msg00007.html FLSA:156139 http://www.securityfocus.com/archive/1/430292/100/0/threaded RHSA-2005:505 http://www.redhat.com/support/errata/RHSA-2005-505.html https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=159208 oval:org.mitre.oval:def:11148 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11148 |
Copyright | Copyright (C) 2008 E-Soft Inc. |
Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |