Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.63966
Categoría:FreeBSD Local Security Checks
Título:FreeBSD Ports: wireshark, wireshark-lite
Resumen:The remote host is missing an update to the system; as announced in the referenced advisory.
Descripción:Summary:
The remote host is missing an update to the system
as announced in the referenced advisory.

Vulnerability Insight:
The following packages are affected:

wireshark
wireshark-lite

CVE-2009-1210
Format string vulnerability in the PROFINET/DCP (PN-DCP) dissector in
Wireshark 1.0.6 and earlier allows remote attackers to execute
arbitrary code via a PN-DCP packet with format string specifiers in
the station name. NOTE: some of these details are obtained from third
party information.

CVE-2009-1268
The Check Point High-Availability Protocol (CPHAP) dissector in
Wireshark 0.9.6 through 1.0.6 allows remote attackers to cause a
denial of service (crash) via a crafted FWHA_MY_STATE packet.

CVE-2009-1269
Unspecified vulnerability in Wireshark 0.99.6 through 1.0.6 allows
remote attackers to cause a denial of service (crash) via a crafted
Tektronix .rf5 file.

Solution:
Update your system with the appropriate patches or
software upgrades.

CVSS Score:
10.0

CVSS Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2009-1210
BugTraq ID: 34291
http://www.securityfocus.com/bid/34291
Bugtraq: 20090417 rPSA-2009-0062-1 tshark wireshark (Google Search)
http://www.securityfocus.com/archive/1/502745/100/0/threaded
Debian Security Information: DSA-1785 (Google Search)
http://www.debian.org/security/2009/dsa-1785
https://www.exploit-db.com/exploits/8308
https://www.redhat.com/archives/fedora-package-announce/2009-May/msg00675.html
https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01167.html
https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01213.html
http://www.mandriva.com/security/advisories?name=MDVSA-2009:088
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5976
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9526
http://www.redhat.com/support/errata/RHSA-2009-1100.html
http://secunia.com/advisories/34542
http://secunia.com/advisories/34778
http://secunia.com/advisories/34970
http://secunia.com/advisories/35133
http://secunia.com/advisories/35224
http://secunia.com/advisories/35416
http://secunia.com/advisories/35464
SuSE Security Announcement: SUSE-SR:2009:011 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00003.html
XForce ISS Database: wireshark-pndcp-format-string(49512)
https://exchange.xforce.ibmcloud.com/vulnerabilities/49512
Common Vulnerability Exposure (CVE) ID: CVE-2009-1268
BugTraq ID: 34457
http://www.securityfocus.com/bid/34457
Debian Security Information: DSA-1942 (Google Search)
http://www.debian.org/security/2009/dsa-1942
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=3269
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10876
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5335
http://www.securitytracker.com/id?1022027
http://secunia.com/advisories/37477
XForce ISS Database: wireshark-cphap-dos(49815)
https://exchange.xforce.ibmcloud.com/vulnerabilities/49815
Common Vulnerability Exposure (CVE) ID: CVE-2009-1269
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10642
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5748
XForce ISS Database: wireshark-rf5file-dos(49816)
https://exchange.xforce.ibmcloud.com/vulnerabilities/49816
CopyrightCopyright (C) 2009 E-Soft Inc.

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.