![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.1.10.2022.0345 |
Categoría: | Mageia Linux Local Security Checks |
Título: | Mageia: Security Advisory (MGASA-2022-0345) |
Resumen: | The remote host is missing an update for the 'tcpreplay' package(s) announced via the MGASA-2022-0345 advisory. |
Descripción: | Summary: The remote host is missing an update for the 'tcpreplay' package(s) announced via the MGASA-2022-0345 advisory. Vulnerability Insight: tcprewrite in Tcpreplay 4.4.1 has a reachable assertion in get_layer4_v6 in common/get.c. (CVE-2022-27939) tcprewrite in Tcpreplay 4.4.1 has a heap-based buffer over-read in get_ipv6_next in common/get.c. (CVE-2022-27940) tcprewrite in Tcpreplay 4.4.1 has a heap-based buffer over-read in get_l2len_protocol in common/get.c. (CVE-2022-27941) tcpprep in Tcpreplay 4.4.1 has a heap-based buffer over-read in parse_mpls in common/get.c. (CVE-2022-27942) Tcpreplay version 4.4.1 contains a memory leakage flaw in fix_ipv6_checksums() function. The highest threat from this vulnerability is to data confidentiality. (CVE-2022-28487) The component tcprewrite in Tcpreplay v4.4.1 was discovered to contain a heap-based buffer overflow in get_ipv6_next at common/get.c:713. (CVE-2022-37047) The component tcprewrite in Tcpreplay v4.4.1 was discovered to contain a heap-based buffer overflow in get_l2len_protocol at common/get.c:344. (CVE-2022-37048) The component tcpprep in Tcpreplay v4.4.1 was discovered to contain a heap-based buffer overflow in parse_mpls at common/get.c:150. (CVE-2022-37049) Affected Software/OS: 'tcpreplay' package(s) on Mageia 8. Solution: Please install the updated package(s). CVSS Score: 6.8 CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2022-27939 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5B75AFRJUGOYHCFG2ZV2JKSUPA6MSCT5/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ECRCFJ6X3IVB7BT4KS6AHQMSL532YXYD/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JWRZO7BG6DHA5NAC3COB45WFXLYRIERC/ https://security.gentoo.org/glsa/202210-08 https://github.com/appneta/tcpreplay/issues/717 Common Vulnerability Exposure (CVE) ID: CVE-2022-27940 https://github.com/appneta/tcpreplay/issues/718 Common Vulnerability Exposure (CVE) ID: CVE-2022-27941 https://github.com/appneta/tcpreplay/issues/716 Common Vulnerability Exposure (CVE) ID: CVE-2022-27942 https://github.com/appneta/tcpreplay/issues/719 Common Vulnerability Exposure (CVE) ID: CVE-2022-28487 https://github.com/appneta/tcpreplay/issues/723 https://github.com/appneta/tcpreplay/pull/720 Common Vulnerability Exposure (CVE) ID: CVE-2022-37047 https://github.com/appneta/tcpreplay/issues/734 Common Vulnerability Exposure (CVE) ID: CVE-2022-37048 https://github.com/appneta/tcpreplay/issues/735 Common Vulnerability Exposure (CVE) ID: CVE-2022-37049 https://github.com/appneta/tcpreplay/issues/736 |
Copyright | Copyright (C) 2022 Greenbone AG |
Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |