English | Deutsch | Español | Português
 ID de Usuario:
 Contraseña:
Nuevo usuario
 Acerca de:   Dedicada | Avanzada | Estándar | Periódica | Sin Riesgo | Escritorio | Básica | Individual | Sello | FAQ
  Resumen de Precio/Funciones | Ordenar  | Nuevas Vulnerabilidades | Confidencialidad | Búsqueda de Vulnerabilidad
 Búsqueda de    
Vulnerabilidad   
    Buscar 123947 Descripciones CVE y
58962 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.71217
Categoría:Red Hat Local Security Checks
Título:RedHat Security Advisory RHSA-2012:0509
Resumen:Redhat Security Advisory RHSA-2012:0509
Descripción:Description:
The remote host is missing updates announced in
advisory RHSA-2012:0509.

Wireshark is a program for monitoring network traffic. Wireshark was
previously known as Ethereal.

Several flaws were found in Wireshark. If Wireshark read a malformed packet
off a network or opened a malicious dump file, it could crash or, possibly,
execute arbitrary code as the user running Wireshark. (CVE-2011-1590,
CVE-2011-4102, CVE-2012-1595)

Several denial of service flaws were found in Wireshark. Wireshark could
crash or stop responding if it read a malformed packet off a network, or
opened a malicious dump file. (CVE-2011-1143, CVE-2011-1957, CVE-2011-1958,
CVE-2011-1959, CVE-2011-2174, CVE-2011-2175, CVE-2011-2597, CVE-2011-2698,
CVE-2012-0041, CVE-2012-0042, CVE-2012-0067, CVE-2012-0066)

Users of Wireshark should upgrade to these updated packages, which contain
backported patches to correct these issues. All running instances of
Wireshark must be restarted for the update to take effect.

Solution:
Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date

http://rhn.redhat.com/errata/RHSA-2012-0509.html

Risk factor : Medium

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2011-1143
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055664.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055650.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055364.html
http://www.redhat.com/support/errata/RHSA-2011-0370.html
SuSE Security Announcement: openSUSE-SU-2011:0347 (Google Search)
https://hermes.opensuse.org/messages/8086844
CERT/CC vulnerability note: VU#215900
http://www.kb.cert.org/vuls/id/215900
BugTraq ID: 46796
http://www.securityfocus.com/bid/46796
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16209
http://www.securitytracker.com/id?1025148
http://secunia.com/advisories/43821
http://secunia.com/advisories/44169
http://secunia.com/advisories/43759
http://secunia.com/advisories/48947
http://www.vupen.com/english/advisories/2011/0719
http://www.vupen.com/english/advisories/2011/0626
Common Vulnerability Exposure (CVE) ID: CVE-2011-1590
http://openwall.com/lists/oss-security/2011/04/18/8
http://openwall.com/lists/oss-security/2011/04/18/2
Debian Security Information: DSA-2274 (Google Search)
http://www.debian.org/security/2011/dsa-2274
http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058993.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058983.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058900.html
http://www.mandriva.com/security/advisories?name=MDVSA-2011:083
SuSE Security Announcement: SUSE-SU-2011:0611 (Google Search)
https://hermes.opensuse.org/messages/8701428
http://www.osvdb.org/71846
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15050
http://securitytracker.com/id?1025388
http://secunia.com/advisories/44172
http://secunia.com/advisories/44374
http://secunia.com/advisories/45149
http://secunia.com/advisories/44822
http://www.vupen.com/english/advisories/2011/1022
http://www.vupen.com/english/advisories/2011/1106
Common Vulnerability Exposure (CVE) ID: CVE-2011-1957
http://openwall.com/lists/oss-security/2011/05/31/20
http://openwall.com/lists/oss-security/2011/06/01/1
http://openwall.com/lists/oss-security/2011/06/01/11
http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061290.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061437.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061477.html
BugTraq ID: 48066
http://www.securityfocus.com/bid/48066
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14325
http://secunia.com/advisories/44449
http://secunia.com/advisories/44958
XForce ISS Database: wireshark-dicom-dos(67790)
https://exchange.xforce.ibmcloud.com/vulnerabilities/67790
Common Vulnerability Exposure (CVE) ID: CVE-2011-1958
RedHat Security Advisories: RHSA-2013:0125
http://rhn.redhat.com/errata/RHSA-2013-0125.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15045
XForce ISS Database: wireshark-diameter-dos(67791)
https://exchange.xforce.ibmcloud.com/vulnerabilities/67791
Common Vulnerability Exposure (CVE) ID: CVE-2011-1959
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14656
XForce ISS Database: wireshark-snoop-dos(67792)
https://exchange.xforce.ibmcloud.com/vulnerabilities/67792
Common Vulnerability Exposure (CVE) ID: CVE-2011-2174
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14777
XForce ISS Database: wireshark-compressed-packet-dos(67793)
https://exchange.xforce.ibmcloud.com/vulnerabilities/67793
Common Vulnerability Exposure (CVE) ID: CVE-2011-2175
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14645
Common Vulnerability Exposure (CVE) ID: CVE-2011-2597
http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063586.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063591.html
http://www.mandriva.com/security/advisories?name=MDVSA-2011:118
SuSE Security Announcement: SUSE-SU-2011:1262 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2011-11/msg00021.html
SuSE Security Announcement: openSUSE-SU-2011:1263 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2011-11/msg00022.html
BugTraq ID: 48506
http://www.securityfocus.com/bid/48506
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14794
http://securitytracker.com/id?1025738
http://secunia.com/advisories/45086
http://secunia.com/advisories/45574
XForce ISS Database: wireshark-lucent-dos(68335)
https://exchange.xforce.ibmcloud.com/vulnerabilities/68335
Common Vulnerability Exposure (CVE) ID: CVE-2011-2698
http://www.openwall.com/lists/oss-security/2011/07/19/5
http://www.openwall.com/lists/oss-security/2011/07/20/2
BugTraq ID: 49071
http://www.securityfocus.com/bid/49071
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14610
XForce ISS Database: wireshark-ansiamap-dos(69074)
https://exchange.xforce.ibmcloud.com/vulnerabilities/69074
Common Vulnerability Exposure (CVE) ID: CVE-2011-4102
http://openwall.com/lists/oss-security/2011/11/01/9
BugTraq ID: 50486
http://www.securityfocus.com/bid/50486
http://osvdb.org/76770
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15073
http://secunia.com/advisories/46644
http://secunia.com/advisories/46913
XForce ISS Database: wireshark-erf-bo(71092)
https://exchange.xforce.ibmcloud.com/vulnerabilities/71092
Common Vulnerability Exposure (CVE) ID: CVE-2012-0041
http://www.openwall.com/lists/oss-security/2012/01/11/7
http://www.openwall.com/lists/oss-security/2012/01/20/4
http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15297
http://secunia.com/advisories/47494
http://secunia.com/advisories/54425
Common Vulnerability Exposure (CVE) ID: CVE-2012-0042
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15368
http://www.securitytracker.com/id?1026507
Common Vulnerability Exposure (CVE) ID: CVE-2012-0066
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15111
Common Vulnerability Exposure (CVE) ID: CVE-2012-0067
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15192
Common Vulnerability Exposure (CVE) ID: CVE-2012-1595
http://www.openwall.com/lists/oss-security/2012/03/28/13
http://lists.fedoraproject.org/pipermail/package-announce/2012-April/078770.html
http://lists.fedoraproject.org/pipermail/package-announce/2012-April/078769.html
SuSE Security Announcement: openSUSE-SU-2012:0558 (Google Search)
http://lists.opensuse.org/opensuse-updates/2012-04/msg00060.html
BugTraq ID: 52737
http://www.securityfocus.com/bid/52737
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15548
http://www.securitytracker.com/id?1026874
http://secunia.com/advisories/48986
http://secunia.com/advisories/48548
XForce ISS Database: wireshark-pcap-dos(74364)
https://exchange.xforce.ibmcloud.com/vulnerabilities/74364
CopyrightCopyright (c) 2012 E-Soft Inc. http://www.securityspace.com

Esta es sólo una de 58962 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.

Registro de Nuevo Usuario
Email:
Usuario:
Contraseña:
Envíeme por email sus boletines mensuales, informándome los últimos servicios, mejoras y encuestas.
Por favor envíeme por email un anuncio de prueba de vulnerabilidades siempre que se agregue una nueva prueba.
   Privacidad
Ingreso de Usuario Registrado
 
Usuario:   
Contraseña:  

 ¿Olvidó su usuario o contraseña??
Email/ID de Usario:




Principal | Acerca de Nosotros | Contáctenos | Programas de Asociado | Developer APIs | Privacidad | Listas de Correo | Abuso
Auditorías de Seguridad | DNS Administrado | Monitoreo de Red | Analizador de Sitio | Informes de Investigación de Internet
Prueba de Web | Whois

© 1998-2018 E-Soft Inc. Todos los derechos reservados.