![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.1.4.2013.1450.1 |
Category: | SuSE Local Security Checks |
Title: | SUSE: Security Advisory (SUSE-SU-2013:1450-1) |
Summary: | The remote host is missing an update for the 'wireshark' package(s) announced via the SUSE-SU-2013:1450-1 advisory. |
Description: | Summary: The remote host is missing an update for the 'wireshark' package(s) announced via the SUSE-SU-2013:1450-1 advisory. Vulnerability Insight: This wireshark version update from 1.8.8 to 1.8.9 includes several security and general bug fixes. (bnc#831718) [link moved to references] > * The Bluetooth SDP dissector could go into a large loop CVE-2013-4927 wnpa-sec-2013-45 * The DIS dissector could go into a large loop CVE-2013-4929 wnpa-sec-2013-47 * The DVB-CI dissector could crash CVE-2013-4930 wnpa-sec-2013-48 * The GSM RR dissector (and possibly others) could go into a large loop CVE-2013-4931 wnpa-sec-2013-49 * The GSM A Common dissector could crash CVE-2013-4932 wnpa-sec-2013-50 * The Netmon file parser could crash CVE-2013-4933 CVE-2013-4934 wnpa-sec-2013-51 * The ASN.1 PER dissector could crash CVE-2013-4935 wnpa-sec-2013-52 The release also fixes various non-security issues. Please see the package changelog for details. Security Issues: * CVE-2013-4927 > * CVE-2013-4929 > * CVE-2013-4930 > * CVE-2013-4931 > * CVE-2013-4932 > * CVE-2013-4933 > * CVE-2013-4934 > * CVE-2013-4935 > Affected Software/OS: 'wireshark' package(s) on SUSE Linux Enterprise Desktop 11-SP2, SUSE Linux Enterprise Desktop 11-SP3, SUSE Linux Enterprise Server 11-SP2, SUSE Linux Enterprise Server 11-SP3, SUSE Linux Enterprise Software Development Kit 11-SP2, SUSE Linux Enterprise Software Development Kit 11-SP3. Solution: Please install the updated package(s). CVSS Score: 7.8 CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2013-4927 http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17636 RedHat Security Advisories: RHSA-2014:0341 http://rhn.redhat.com/errata/RHSA-2014-0341.html http://secunia.com/advisories/54296 http://secunia.com/advisories/54371 http://secunia.com/advisories/54425 SuSE Security Announcement: openSUSE-SU-2013:1295 (Google Search) http://lists.opensuse.org/opensuse-updates/2013-08/msg00004.html SuSE Security Announcement: openSUSE-SU-2013:1300 (Google Search) http://lists.opensuse.org/opensuse-updates/2013-08/msg00009.html Common Vulnerability Exposure (CVE) ID: CVE-2013-4929 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17028 Common Vulnerability Exposure (CVE) ID: CVE-2013-4930 Debian Security Information: DSA-2734 (Google Search) http://www.debian.org/security/2013/dsa-2734 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16929 http://secunia.com/advisories/54178 Common Vulnerability Exposure (CVE) ID: CVE-2013-4931 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17325 Common Vulnerability Exposure (CVE) ID: CVE-2013-4932 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17260 Common Vulnerability Exposure (CVE) ID: CVE-2013-4933 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17412 Common Vulnerability Exposure (CVE) ID: CVE-2013-4934 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17584 Common Vulnerability Exposure (CVE) ID: CVE-2013-4935 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17417 |
Copyright | Copyright (C) 2021 Greenbone AG |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |