Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
146377 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.122284
Categoría:Oracle Linux Local Security Checks
Título:Oracle: Security Advisory (ELSA-2011-0013)
Resumen:The remote host is missing an update for the 'wireshark' package(s) announced via the ELSA-2011-0013 advisory.
Descripción:Summary:
The remote host is missing an update for the 'wireshark' package(s) announced via the ELSA-2011-0013 advisory.

Vulnerability Insight:
[1.2.13-1.0.1.el6_0.2]
- Add oracle-ocfs2-network.patch to allow disassembly of OCFS2 interconnect
packets bug#11486

[1.2.13-1.1]
- fix buffer overflow in ENTTEC dissector
- Resolves: #667337

[1.2.13-1]
- upgrade to 1.2.13
- see [link moved to references]
- see [link moved to references]
- see [link moved to references]
- Resolves: #657534 (CVE-2010-4300 CVE-2010-3445)

Affected Software/OS:
'wireshark' package(s) on Oracle Linux 4, Oracle Linux 5, Oracle Linux 6.

Solution:
Please install the updated package(s).

CVSS Score:
9.3

CVSS Vector:
AV:N/AC:M/Au:N/C:C/I:C/A:C

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2010-3445
20100913 Wireshark 1.4.0 Malformed SNMP V1 Packet Denial of Service
http://archives.neohapsis.com/archives/bugtraq/2010-09/0088.html
42392
http://secunia.com/advisories/42392
42411
http://secunia.com/advisories/42411
42877
http://secunia.com/advisories/42877
43068
http://secunia.com/advisories/43068
43197
http://www.securityfocus.com/bid/43197
43759
http://secunia.com/advisories/43759
43821
http://secunia.com/advisories/43821
ADV-2010-3067
http://www.vupen.com/english/advisories/2010/3067
ADV-2010-3093
http://www.vupen.com/english/advisories/2010/3093
ADV-2011-0076
http://www.vupen.com/english/advisories/2011/0076
ADV-2011-0212
http://www.vupen.com/english/advisories/2011/0212
ADV-2011-0404
http://www.vupen.com/english/advisories/2011/0404
ADV-2011-0626
http://www.vupen.com/english/advisories/2011/0626
ADV-2011-0719
http://www.vupen.com/english/advisories/2011/0719
DSA-2127
http://www.debian.org/security/2010/dsa-2127
FEDORA-2011-2620
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055664.html
FEDORA-2011-2632
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055650.html
FEDORA-2011-2648
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055364.html
MDVSA-2010:200
http://www.mandriva.com/security/advisories?name=MDVSA-2010:200
RHSA-2010:0924
http://www.redhat.com/support/errata/RHSA-2010-0924.html
RHSA-2011:0370
http://www.redhat.com/support/errata/RHSA-2011-0370.html
SUSE-SR:2011:001
http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00003.html
SUSE-SR:2011:002
http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html
VU#215900
http://www.kb.cert.org/vuls/id/215900
[oss-security] 20101001 Re: CVE requests: Poppler, Quassel, Pyfribidi, Overkill, DocUtils, FireGPG, Wireshark
http://www.openwall.com/lists/oss-security/2010/10/01/10
[oss-security] 20101011 Re: CVE requests: Poppler, Quassel, Pyfribidi, Overkill, DocUtils, FireGPG, Wireshark
http://www.openwall.com/lists/oss-security/2010/10/12/1
http://blogs.sun.com/security/entry/resource_management_errors_vulnerability_in
http://www.wireshark.org/security/wnpa-sec-2010-12.html
http://xorl.wordpress.com/2010/10/15/cve-2010-3445-wireshark-asn-1-ber-stack-overflow/
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5230
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2010-3445
oval:org.mitre.oval:def:14607
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14607
Common Vulnerability Exposure (CVE) ID: CVE-2010-4300
BugTraq ID: 44987
http://www.securityfocus.com/bid/44987
http://www.exploit-db.com/exploits/15676
http://www.mandriva.com/security/advisories?name=MDVSA-2010:242
http://osvdb.org/69354
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14287
http://www.securitytracker.com/id?1024762
http://secunia.com/advisories/42290
SuSE Security Announcement: SUSE-SR:2011:001 (Google Search)
SuSE Security Announcement: SUSE-SR:2011:002 (Google Search)
http://www.vupen.com/english/advisories/2010/3038
http://www.vupen.com/english/advisories/2010/3068
Common Vulnerability Exposure (CVE) ID: CVE-2010-4538
1024930
http://www.securitytracker.com/id?1024930
42767
http://secunia.com/advisories/42767
42853
http://secunia.com/advisories/42853
42910
http://secunia.com/advisories/42910
42914
http://secunia.com/advisories/42914
45634
http://www.securityfocus.com/bid/45634
70244
http://osvdb.org/70244
ADV-2011-0008
http://www.vupen.com/english/advisories/2011/0008
ADV-2011-0053
http://www.vupen.com/english/advisories/2011/0053
ADV-2011-0069
http://www.vupen.com/english/advisories/2011/0069
ADV-2011-0079
http://www.vupen.com/english/advisories/2011/0079
ADV-2011-0099
http://www.vupen.com/english/advisories/2011/0099
ADV-2011-0110
http://www.vupen.com/english/advisories/2011/0110
DSA-2144
http://www.debian.org/security/2011/dsa-2144
FEDORA-2011-0128
http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053042.html
FEDORA-2011-0167
http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053061.html
MDVSA-2011:002
http://www.mandriva.com/security/advisories?name=MDVSA-2011:002
RHSA-2011:0013
http://www.redhat.com/support/errata/RHSA-2011-0013.html
[oss-security] 20101231 CVE Request: Wireshark
http://openwall.com/lists/oss-security/2010/12/31/7
[oss-security] 20110103 Re: CVE Request: Wireshark
http://openwall.com/lists/oss-security/2011/01/03/8
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5539
oval:org.mitre.oval:def:14937
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14937
CopyrightCopyright (C) 2015 Greenbone AG

Esta es sólo una de 146377 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.