Anfälligkeitssuche        Suche in 211766 CVE Beschreibungen
und 97459 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.1.4.2017.0656.1
Kategorie:SuSE Local Security Checks
Titel:SUSE: Security Advisory (SUSE-SU-2017:0656-1)
Zusammenfassung:The remote host is missing an update for the 'tcpdump' package(s) announced via the SUSE-SU-2017:0656-1 advisory.
Beschreibung:Summary:
The remote host is missing an update for the 'tcpdump' package(s) announced via the SUSE-SU-2017:0656-1 advisory.

Vulnerability Insight:
This update for tcpdump fixes the following issues:
Security issues fixed (bsc#1020940):
- CVE-2016-7922: Corrected buffer overflow in AH parser
print-ah.c:ah_print().
- CVE-2016-7923: Corrected buffer overflow in ARP parser
print-arp.c:arp_print().
- CVE-2016-7925: Corrected buffer overflow in compressed SLIP parser
print-sl.c:sl_if_print().
- CVE-2016-7926: Corrected buffer overflow in the Ethernet parser
print-ether.c:ethertype_print().
- CVE-2016-7927: Corrected buffer overflow in the IEEE 802.11 parser
print-802_11.c:ieee802_11_radio_print().
- CVE-2016-7928: Corrected buffer overflow in the IPComp parser
print-ipcomp.c:ipcomp_print().
- CVE-2016-7931: Corrected buffer overflow in the MPLS parser
print-mpls.c:mpls_print().
- CVE-2016-7936: Corrected buffer overflow in the UDP parser
print-udp.c:udp_print().
- CVE-2016-7934,CVE-2016-7935,CVE-2016-7937: Corrected segmentation faults
in function udp_print().
- CVE-2016-7939: Corrected buffer overflows in GRE parser
print-gre.c:(multiple functions).
- CVE-2016-7940: Corrected buffer overflows in STP parser
print-stp.c:(multiple functions).
- CVE-2016-7973: Corrected buffer overflow in AppleTalk parser
print-atalk.c.
- CVE-2016-7974: Corrected buffer overflow in IP parser
print-ip.c:(multiple functions).
- CVE-2016-7975: Corrected buffer overflow in TCP parser
print-tcp.c:tcp_print().
- CVE-2016-7983,CVE-2016-7984: Corrected buffer overflow in TFTP parser
print-tftp.c:tftp_print().
- CVE-2016-7992: Corrected buffer overflow in Classical IP over ATM parser
print-cip.c.
- CVE-2016-7993: Corrected buffer overflow in multiple protocol parsers
(DNS, DVMRP, HSRP, etc.).
- CVE-2016-8574: Corrected buffer overflow in FRF.15 parser
print-fr.c:frf15_print().
- CVE-2017-5202: Corrected buffer overflow in ISO CLNS parser
print-isoclns.c:clnp_print().
- CVE-2017-5203: Corrected buffer overflow in BOOTP parser
print-bootp.c:bootp_print().
- CVE-2017-5204: Corrected buffer overflow in IPv6 parser
print-ip6.c:ip6_print().
- CVE-2017-5483: Corrected buffer overflow in SNMP parser
print-snmp.c:asn1_parse().
- CVE-2017-5484: Corrected buffer overflow in ATM parser
print-atm.c:sig_print().
- CVE-2017-5485: Corrected buffer overflow in ISO CLNS parser
addrtoname.c:lookup_nsap().
- CVE-2017-5486: Corrected buffer overflow in ISO CLNS parser
print-isoclns.c:clnp_print().

Affected Software/OS:
'tcpdump' package(s) on SUSE Linux Enterprise Server 11-SP4, SUSE Linux Enterprise Debuginfo 11-SP4

Solution:
Please install the updated package(s).

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2016-7922
BugTraq ID: 95852
http://www.securityfocus.com/bid/95852
Debian Security Information: DSA-3775 (Google Search)
http://www.debian.org/security/2017/dsa-3775
https://security.gentoo.org/glsa/201702-30
RedHat Security Advisories: RHSA-2017:1871
https://access.redhat.com/errata/RHSA-2017:1871
http://www.securitytracker.com/id/1037755
Common Vulnerability Exposure (CVE) ID: CVE-2016-7923
Common Vulnerability Exposure (CVE) ID: CVE-2016-7925
Common Vulnerability Exposure (CVE) ID: CVE-2016-7926
Common Vulnerability Exposure (CVE) ID: CVE-2016-7927
Common Vulnerability Exposure (CVE) ID: CVE-2016-7928
Common Vulnerability Exposure (CVE) ID: CVE-2016-7931
Common Vulnerability Exposure (CVE) ID: CVE-2016-7934
Common Vulnerability Exposure (CVE) ID: CVE-2016-7935
Common Vulnerability Exposure (CVE) ID: CVE-2016-7936
Common Vulnerability Exposure (CVE) ID: CVE-2016-7937
Common Vulnerability Exposure (CVE) ID: CVE-2016-7939
Common Vulnerability Exposure (CVE) ID: CVE-2016-7940
Common Vulnerability Exposure (CVE) ID: CVE-2016-7973
Common Vulnerability Exposure (CVE) ID: CVE-2016-7974
Common Vulnerability Exposure (CVE) ID: CVE-2016-7975
Common Vulnerability Exposure (CVE) ID: CVE-2016-7983
Common Vulnerability Exposure (CVE) ID: CVE-2016-7984
Common Vulnerability Exposure (CVE) ID: CVE-2016-7992
Common Vulnerability Exposure (CVE) ID: CVE-2016-7993
Common Vulnerability Exposure (CVE) ID: CVE-2016-8574
Common Vulnerability Exposure (CVE) ID: CVE-2017-5202
Common Vulnerability Exposure (CVE) ID: CVE-2017-5203
Common Vulnerability Exposure (CVE) ID: CVE-2017-5204
Common Vulnerability Exposure (CVE) ID: CVE-2017-5483
Common Vulnerability Exposure (CVE) ID: CVE-2017-5484
Common Vulnerability Exposure (CVE) ID: CVE-2017-5485
Common Vulnerability Exposure (CVE) ID: CVE-2017-5486
CopyrightCopyright (C) 2021 Greenbone Networks GmbH

Dies ist nur einer von 97459 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2021 E-Soft Inc. Alle Rechte vorbehalten.