Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
146377 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.69241
Categoría:Mandrake Local Security Checks
Título:Mandriva Security Advisory MDVSA-2011:044 (wireshark)
Resumen:NOSUMMARY
Descripción:Description:
The remote host is missing an update to wireshark
announced via advisory MDVSA-2011:044.

This advisory updates wireshark to the latest version (1.2.15),
fixing several security issues:

Wireshark 1.5.0, 1.4.3, and earlier frees an uninitialized pointer
during processing of a .pcap file in the pcap-ng format, which allows
remote attackers to cause a denial of service (memory corruption)
or possibly have unspecified other impact via a malformed file
(CVE-2011-0538).

Heap-based buffer overflow in wiretap/dct3trace.c in Wireshark
1.2.0 through 1.2.14 and 1.4.0 through 1.4.3 allows remote attackers
to cause a denial of service (application crash) or possibly have
unspecified other impact via a long record in a Nokia DCT3 trace file
(CVE-2011-0713).

wiretap/pcapng.c in Wireshark 1.2.0 through 1.2.14 and 1.4.0 through
1.4.3 allows remote attackers to cause a denial of service (application
crash) via a pcap-ng file that contains a large packet-length field
(CVE-2011-1139).

Multiple stack consumption vulnerabilities in the
dissect_ms_compressed_string and dissect_mscldap_string functions in
Wireshark 1.0.x, 1.2.0 through 1.2.14, and 1.4.0 through 1.4.3 allow
remote attackers to cause a denial of service (infinite recursion)
via a crafted (1) SMB or (2) Connection-less LDAP (CLDAP) packet
(CVE-2011-1140).

epan/dissectors/packet-ldap.c in Wireshark 1.0.x, 1.2.0 through 1.2.14,
and 1.4.0 through 1.4.3 allows remote attackers to cause a denial
of service (memory consumption) via (1) a long LDAP filter string or
(2) an LDAP filter string containing many elements (CVE-2011-1141).

Stack consumption vulnerability in the dissect_ber_choice function in
the BER dissector in Wireshark 1.2.x through 1.2.15 and 1.4.x through
1.4.4 might allow remote attackers to cause a denial of service
(infinite loop) via vectors involving self-referential ASN.1 CHOICE
values (CVE-2011-1142).

The updated packages have been upgraded to the latest 1.2.x version
(1.2.15) and patched to correct these issues.

Affected: 2010.0, 2010.1, Corporate 4.0, Enterprise Server 5.0

Solution:
To upgrade automatically use MandrakeUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2011:044
http://www.wireshark.org/docs/relnotes/wireshark-1.2.15.html

Risk factor : High

CVSS Score:
6.8

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2011-0538
1025148
http://www.securitytracker.com/id?1025148
43759
http://secunia.com/advisories/43759
43795
http://secunia.com/advisories/43795
43821
http://secunia.com/advisories/43821
46167
http://www.securityfocus.com/bid/46167
ADV-2011-0622
http://www.vupen.com/english/advisories/2011/0622
ADV-2011-0626
http://www.vupen.com/english/advisories/2011/0626
ADV-2011-0719
http://www.vupen.com/english/advisories/2011/0719
ADV-2011-0747
http://www.vupen.com/english/advisories/2011/0747
DSA-2201
http://www.debian.org/security/2011/dsa-2201
FEDORA-2011-2620
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055664.html
FEDORA-2011-2632
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055650.html
FEDORA-2011-2648
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055364.html
MDVSA-2011:044
http://www.mandriva.com/security/advisories?name=MDVSA-2011:044
RHSA-2011:0369
http://www.redhat.com/support/errata/RHSA-2011-0369.html
RHSA-2011:0370
http://www.redhat.com/support/errata/RHSA-2011-0370.html
VU#215900
http://www.kb.cert.org/vuls/id/215900
[oss-security] 20110204 Wireshark: Freeing uninitialized pointer
http://openwall.com/lists/oss-security/2011/02/04/1
http://www.wireshark.org/docs/relnotes/wireshark-1.2.15.html
http://www.wireshark.org/docs/relnotes/wireshark-1.4.4.html
http://www.wireshark.org/security/wnpa-sec-2011-03.html
http://www.wireshark.org/security/wnpa-sec-2011-04.html
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5652
https://bugzilla.redhat.com/show_bug.cgi?id=676232
oval:org.mitre.oval:def:14605
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14605
wireshark-pcap-code-execution(65182)
https://exchange.xforce.ibmcloud.com/vulnerabilities/65182
Common Vulnerability Exposure (CVE) ID: CVE-2011-0713
46416
http://www.securityfocus.com/bid/46416
[oss-security] 20110216 wireshark dct3trace buffer overflow
http://openwall.com/lists/oss-security/2011/02/16/13
http://anonsvn.wireshark.org/viewvc?view=rev&revision=35953
https://bugzilla.redhat.com/show_bug.cgi?id=678198
oval:org.mitre.oval:def:14766
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14766
wireshark-nokiadct3-bo(65780)
https://exchange.xforce.ibmcloud.com/vulnerabilities/65780
wireshark-visualc-bo(65460)
https://exchange.xforce.ibmcloud.com/vulnerabilities/65460
Common Vulnerability Exposure (CVE) ID: CVE-2011-1139
CERT/CC vulnerability note: VU#215900
Debian Security Information: DSA-2201 (Google Search)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14997
http://secunia.com/advisories/44169
SuSE Security Announcement: openSUSE-SU-2011:0347 (Google Search)
https://hermes.opensuse.org/messages/8086844
XForce ISS Database: wireshark-pcapng-dos(65779)
https://exchange.xforce.ibmcloud.com/vulnerabilities/65779
Common Vulnerability Exposure (CVE) ID: CVE-2011-1140
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14715
Common Vulnerability Exposure (CVE) ID: CVE-2011-1141
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14974
Common Vulnerability Exposure (CVE) ID: CVE-2011-1142
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14724
CopyrightCopyright (c) 2011 E-Soft Inc. http://www.securityspace.com

Esta es sólo una de 146377 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.