Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
146377 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.51426
Categoría:Conectiva Local Security Checks
Título:Conectiva Security Advisory CLA-2003:662
Resumen:NOSUMMARY
Descripción:Description:

The remote host is missing updates announced in
advisory CLA-2003:662.

Ethereal[1] is a powerful network traffic analyzer with a graphical
usr interface (GUI).

This update announcement addresses several vulnerabilities[2,3] in
ethereal versions <= 0.9.12. These vulnerabilities can be exploited
by an attacker who can insert crafted packets in the wire being
monitored by ethereal or make an user open a trace file with such
packets inside. Successful exploitation of these vulnerabilities can
lead to denial of service conditions and/or remote execution of
arbitrary code.

The following vulnerabilities have been fixed:

- Denial of Service (DoS) in the DCERPC dissector when trying to
decode a NDR string[4]

- Buffer overflow in the OSI dissector when decoding IPv4 or IPv6
prefixes[5]

- Denial of Service (DoS) in the SPNEGO dissector when parsing an
invalid ASN.1 value[6]

- Memory handling error in the tvb_get_nstringz0() routine when
handling a zero-length buffer size[7]

- Handling string vulnerabilities in the BGP, WTP, DNS, 802.11,
ISAKMP, WSP, CLNP, ISIS and RMI dissectors[8].

The Common Vulnerabilities and Exposures (CVE) project has assigned
the names CAN-2003-04{28,29,30,31,32} to these issues, respectively.


Solution:
The apt tool can be used to perform RPM package upgrades
by running 'apt-get update' followed by 'apt-get upgrade'

http://www.ethereal.com
http://www.ethereal.com/appnotes/enpa-sa-00010.html
http://distro2.conectiva.com.br/bugzilla/show_bug.cgi?id=8687
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0428
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0429
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0430
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0431
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0432
https://secure1.securityspace.com/smysecure/catid.html?in=CLA-2003:662
http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=002003

Risk factor : Critical

CVSS Score:
10.0

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2003-0428
CERT/CC vulnerability note: VU#542540
http://www.kb.cert.org/vuls/id/542540
Conectiva Linux advisory: CLA-2003:662
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000662
Debian Security Information: DSA-324 (Google Search)
http://www.debian.org/security/2003/dsa-324
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A75
http://www.redhat.com/support/errata/RHSA-2003-077.html
SCO Security Bulletin: CSSA-2003-030.0
ftp://ftp.sco.com/pub/security/OpenLinux/CSSA-2003-030.0.txt
http://secunia.com/advisories/9007
Common Vulnerability Exposure (CVE) ID: CVE-2003-0429
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A84
Common Vulnerability Exposure (CVE) ID: CVE-2003-0430
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A88
Common Vulnerability Exposure (CVE) ID: CVE-2003-0431
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A101
Common Vulnerability Exposure (CVE) ID: CVE-2003-0432
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A106
CopyrightCopyright (c) 2005 E-Soft Inc. http://www.securityspace.com

Esta es sólo una de 146377 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.