![]() |
Startseite ▼ Bookkeeping
Online ▼ Sicherheits
Überprüfungs ▼
Verwaltetes
DNS ▼
Info
Bestellen/Erneuern
FAQ
AUP
Dynamic DNS Clients
Domaine konfigurieren Dyanmic DNS Update Password Netzwerk
Überwachung ▼
Enterprise
Erweiterte
Standard
Gratis Test
FAQ
Preis/Funktionszusammenfassung
Bestellen
Beispiele
Konfigurieren/Status Alarm Profile | ||
Test Kennung: | 1.3.6.1.4.1.25623.1.0.807446 |
Kategorie: | Denial of Service |
Titel: | Wireshark Multiple Denial-of-Service Vulnerabilities (Mar 2016) - Windows |
Zusammenfassung: | Wireshark is prone to multiple denial of service vulnerabilities. |
Beschreibung: | Summary: Wireshark is prone to multiple denial of service vulnerabilities. Vulnerability Insight: Multiple flaws exist due to: - The 'dissect_nhdr_extopt' function in 'epan/dissectors/packet-lbmc.c' script in the LBMC dissector does not validate length values. - The 'wiretap/nettrace_3gpp_32_423.c' script in the 3GPP TS 32.423 Trace file parser does not ensure that a '\0' character is present at the end of certain strings. - The 'epan/dissectors/packet-hiqnet.c' script in the HiQnet dissector does not validate the data type. - The 'epan/dissectors/packet-x509af.c' script in the X.509AF dissector mishandles the algorithm ID. - The 'epan/dissectors/packet-http2.c' script in the HTTP/2 dissector does not limit the amount of header data. - The 'dissect_ber_constrained_bitstring' function in 'epan/dissectors/packet-ber.c' script in the ASN.1 BER dissector does not verify that a certain length is nonzero. - A heap-based buffer overflow error in 'wiretap/vwr.c' script in the Ixia IxVeriWave file parser. - An error in NFS dissector. - 'epan/dissectors/packet-spice.c' script in the SPICE dissector in mishandles capability data. - 'epan/dissectors/packet-ieee80211.c' script in the IEEE 802.11 dissector mishandles the Grouping subfield. Vulnerability Impact: Successful exploitation will allow remote attackers to conduct denial of service attack. Affected Software/OS: Wireshark version 2.0.x before 2.0.2 on Windows Solution: Upgrade to Wireshark version 2.0.2 or later. CVSS Score: 4.3 CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P |
Querverweis: |
Common Vulnerability Exposure (CVE) ID: CVE-2016-2528 https://security.gentoo.org/glsa/201604-05 http://www.securitytracker.com/id/1035118 Common Vulnerability Exposure (CVE) ID: CVE-2016-2527 Common Vulnerability Exposure (CVE) ID: CVE-2016-2526 Common Vulnerability Exposure (CVE) ID: CVE-2016-2524 Common Vulnerability Exposure (CVE) ID: CVE-2016-2525 Common Vulnerability Exposure (CVE) ID: CVE-2016-2522 Common Vulnerability Exposure (CVE) ID: CVE-2016-4415 https://code.google.com/p/google-security-research/issues/detail?id=647 Common Vulnerability Exposure (CVE) ID: CVE-2016-4416 Common Vulnerability Exposure (CVE) ID: CVE-2016-4419 Common Vulnerability Exposure (CVE) ID: CVE-2016-4420 |
Copyright | Copyright (C) 2016 Greenbone AG |
Dies ist nur einer von 146377 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus. Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten. |