Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | |||
ID de Prueba: | 1.3.6.1.4.1.25623.1.1.2.2020.1072 |
Categoría: | Huawei EulerOS Local Security Checks |
Título: | Huawei EulerOS: Security Advisory for tcpdump (EulerOS-SA-2020-1072) |
Resumen: | The remote host is missing an update for the Huawei EulerOS 'tcpdump' package(s) announced via the EulerOS-SA-2020-1072 advisory. |
Descripción: | Summary: The remote host is missing an update for the Huawei EulerOS 'tcpdump' package(s) announced via the EulerOS-SA-2020-1072 advisory. Vulnerability Insight: tcpdump.org tcpdump 4.9.2 is affected by: CWE-126: Buffer Over-read. The impact is: May expose Saved Frame Pointer, Return Address etc. on stack. The component is: line 234: 'ND_PRINT((ndo, '%s', buf)),', in function named 'print_prefix', in 'print-hncp.c'. The attack vector is: The victim must open a specially crafted pcap file.(CVE-2019-1010220) In tcpdump 4.9.2, a stack-based buffer over-read exists in the print_prefix function of print-hncp.c via crafted packet data because of missing initialization.(CVE-2018-19519) This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.(CVE-2019-15167) lmp_print_data_link_subobjs() in print-lmp.c in tcpdump before 4.9.3 lacks certain bounds checks.(CVE-2019-15166) The HNCP parser in tcpdump before 4.9.3 has a buffer over-read in print-hncp.c:print_prefix().(CVE-2018-16228) The BGP parser in tcpdump before 4.9.3 allows stack consumption in print-bgp.c:bgp_attr_print() because of unlimited recursion.(CVE-2018-16300) The SMB parser in tcpdump before 4.9.3 has stack exhaustion in smbutil.c:smb_fdata() via recursion.(CVE-2018-16452) The BGP parser in tcpdump before 4.9.3 has a buffer over-read in print-bgp.c:bgp_attr_print() (MP_REACH_NLRI).(CVE-2018-16230) libpcap before 1.9.1, as used in tcpdump before 4.9.3, has a buffer overflow and/or over-read because of errors in pcapng reading.(CVE-2018-16301) The DCCP parser in tcpdump before 4.9.3 has a buffer over-read in print-dccp.c:dccp_print_option().(CVE-2018-16229) The IEEE 802.11 parser in tcpdump before 4.9.3 has a buffer over-read in print-802_11.c for the Mesh Flags subfield.(CVE-2018-16227) The ICMPv6 parser in tcpdump before 4.9.3 has a buffer over-read in print-icmp6.c.(CVE-2018-14882) The SMB parser in tcpdump before 4.9.3 has buffer over-reads in print-smb.c:print_trans() for \MAILSLOT\BROWSE and \PIPE\LANMAN.(CVE-2018-16451) The OSPFv3 parser in tcpdump before 4.9.3 has a buffer over-read in print-ospf6.c:ospf6_print_lshdr().(CVE-2018-14880) tcpdump before 4.9.3 mishandles the printing of SMB data (issue 2 of 2).(CVE-2018-10105) tcpdump before 4.9.3 mishandles the printing of SMB data (issue 1 of 2).(CVE-2018-10103) The BGP parser in tcpdump before 4.9.3 has a buffer over-read in print-bgp.c:bgp_capabilities_print() (BGP_CAPCODE_MP).(CVE-2018-14467) The VRRP parser in tcpdump before 4.9.3 has a buffer over-read in print-vrrp.c:vrrp_print().(CVE-2018-14463) The LMP parser in tcpdump before 4.9.3 has a buffer over-read in print-lmp.c:lmp_print_data_link_subobjs().(CVE-2018-14464) The BGP parser in tcpdump before 4.9.3 has a buffer over-read in print-bgp.c:bgp_capabilities_print() (BGP_CAPCODE_RESTART).(CVE-2018-14881) The RSVP parser in tcpdump before 4.9.3 has a buffer over-read in ... [Please see the references for more information on the vulnerabilities] Affected Software/OS: 'tcpdump' package(s) on Huawei EulerOS Virtualization for ARM 64 3.0.5.0. Solution: Please install the updated package(s). CVSS Score: 7.5 CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2017-16808 Common Vulnerability Exposure (CVE) ID: CVE-2018-10103 Common Vulnerability Exposure (CVE) ID: CVE-2018-10105 Common Vulnerability Exposure (CVE) ID: CVE-2018-14461 Common Vulnerability Exposure (CVE) ID: CVE-2018-14462 Common Vulnerability Exposure (CVE) ID: CVE-2018-14463 Common Vulnerability Exposure (CVE) ID: CVE-2018-14464 Common Vulnerability Exposure (CVE) ID: CVE-2018-14465 Common Vulnerability Exposure (CVE) ID: CVE-2018-14466 Common Vulnerability Exposure (CVE) ID: CVE-2018-14467 Common Vulnerability Exposure (CVE) ID: CVE-2018-14468 Common Vulnerability Exposure (CVE) ID: CVE-2018-14469 Common Vulnerability Exposure (CVE) ID: CVE-2018-14470 Common Vulnerability Exposure (CVE) ID: CVE-2018-14880 Common Vulnerability Exposure (CVE) ID: CVE-2018-14881 Common Vulnerability Exposure (CVE) ID: CVE-2018-14882 Common Vulnerability Exposure (CVE) ID: CVE-2018-16227 Common Vulnerability Exposure (CVE) ID: CVE-2018-16228 Common Vulnerability Exposure (CVE) ID: CVE-2018-16229 Common Vulnerability Exposure (CVE) ID: CVE-2018-16230 Common Vulnerability Exposure (CVE) ID: CVE-2018-16300 Common Vulnerability Exposure (CVE) ID: CVE-2018-16301 Common Vulnerability Exposure (CVE) ID: CVE-2018-16451 Common Vulnerability Exposure (CVE) ID: CVE-2018-16452 Common Vulnerability Exposure (CVE) ID: CVE-2018-19519 Common Vulnerability Exposure (CVE) ID: CVE-2019-1010220 Common Vulnerability Exposure (CVE) ID: CVE-2019-15166 Common Vulnerability Exposure (CVE) ID: CVE-2019-15167 |
Copyright | Copyright (C) 2020 Greenbone Networks GmbH |
Esta es sólo una de 99761 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |