English | Deutsch | Español | Português
 UserID:
 Passwd:
new user
 About:   Dedicated  | Advanced  | Standard  | Recurring  | No Risk  | Desktop  | Basic  | Single  | Security Seal  | FAQ
  Price/Feature Summary  | Order  | New Vulnerabilities  | Confidentiality  | Vulnerability Search
 Vulnerability   
Search   
    Search 95248 CVE descriptions
and 52540 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.69241
Category:Mandrake Local Security Checks
Title:Mandriva Security Advisory MDVSA-2011:044 (wireshark)
Summary:Mandriva Security Advisory MDVSA-2011:044 (wireshark)
Description:Description:
The remote host is missing an update to wireshark
announced via advisory MDVSA-2011:044.

This advisory updates wireshark to the latest version (1.2.15),
fixing several security issues:

Wireshark 1.5.0, 1.4.3, and earlier frees an uninitialized pointer
during processing of a .pcap file in the pcap-ng format, which allows
remote attackers to cause a denial of service (memory corruption)
or possibly have unspecified other impact via a malformed file
(CVE-2011-0538).

Heap-based buffer overflow in wiretap/dct3trace.c in Wireshark
1.2.0 through 1.2.14 and 1.4.0 through 1.4.3 allows remote attackers
to cause a denial of service (application crash) or possibly have
unspecified other impact via a long record in a Nokia DCT3 trace file
(CVE-2011-0713).

wiretap/pcapng.c in Wireshark 1.2.0 through 1.2.14 and 1.4.0 through
1.4.3 allows remote attackers to cause a denial of service (application
crash) via a pcap-ng file that contains a large packet-length field
(CVE-2011-1139).

Multiple stack consumption vulnerabilities in the
dissect_ms_compressed_string and dissect_mscldap_string functions in
Wireshark 1.0.x, 1.2.0 through 1.2.14, and 1.4.0 through 1.4.3 allow
remote attackers to cause a denial of service (infinite recursion)
via a crafted (1) SMB or (2) Connection-less LDAP (CLDAP) packet
(CVE-2011-1140).

epan/dissectors/packet-ldap.c in Wireshark 1.0.x, 1.2.0 through 1.2.14,
and 1.4.0 through 1.4.3 allows remote attackers to cause a denial
of service (memory consumption) via (1) a long LDAP filter string or
(2) an LDAP filter string containing many elements (CVE-2011-1141).

Stack consumption vulnerability in the dissect_ber_choice function in
the BER dissector in Wireshark 1.2.x through 1.2.15 and 1.4.x through
1.4.4 might allow remote attackers to cause a denial of service
(infinite loop) via vectors involving self-referential ASN.1 CHOICE
values (CVE-2011-1142).

The updated packages have been upgraded to the latest 1.2.x version
(1.2.15) and patched to correct these issues.

Affected: 2010.0, 2010.1, Corporate 4.0, Enterprise Server 5.0

Solution:
To upgrade automatically use MandrakeUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2011:044
http://www.wireshark.org/docs/relnotes/wireshark-1.2.15.html

Risk factor : High

CVSS Score:
6.8

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2011-0538
http://openwall.com/lists/oss-security/2011/02/04/1
Debian Security Information: DSA-2201 (Google Search)
http://www.debian.org/security/2011/dsa-2201
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055664.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055650.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055364.html
http://www.mandriva.com/security/advisories?name=MDVSA-2011:044
http://www.redhat.com/support/errata/RHSA-2011-0370.html
http://www.redhat.com/support/errata/RHSA-2011-0369.html
CERT/CC vulnerability note: VU#215900
http://www.kb.cert.org/vuls/id/215900
BugTraq ID: 46167
http://www.securityfocus.com/bid/46167
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:14605
http://www.securitytracker.com/id?1025148
http://secunia.com/advisories/43821
http://secunia.com/advisories/43795
http://secunia.com/advisories/43759
http://www.vupen.com/english/advisories/2011/0719
http://www.vupen.com/english/advisories/2011/0622
http://www.vupen.com/english/advisories/2011/0747
http://www.vupen.com/english/advisories/2011/0626
XForce ISS Database: wireshark-pcap-code-execution(65182)
http://xforce.iss.net/xforce/xfdb/65182
Common Vulnerability Exposure (CVE) ID: CVE-2011-0713
http://openwall.com/lists/oss-security/2011/02/16/13
BugTraq ID: 46416
http://www.securityfocus.com/bid/46416
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:14766
XForce ISS Database: wireshark-visualc-bo(65460)
http://xforce.iss.net/xforce/xfdb/65460
XForce ISS Database: wireshark-nokiadct3-bo(65780)
http://xforce.iss.net/xforce/xfdb/65780
Common Vulnerability Exposure (CVE) ID: CVE-2011-1139
SuSE Security Announcement: openSUSE-SU-2011:0347 (Google Search)
https://hermes.opensuse.org/messages/8086844
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:14997
http://secunia.com/advisories/44169
XForce ISS Database: wireshark-pcapng-dos(65779)
http://xforce.iss.net/xforce/xfdb/65779
Common Vulnerability Exposure (CVE) ID: CVE-2011-1140
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:14715
Common Vulnerability Exposure (CVE) ID: CVE-2011-1141
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:14974
Common Vulnerability Exposure (CVE) ID: CVE-2011-1142
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:14724
CopyrightCopyright (c) 2011 E-Soft Inc. http://www.securityspace.com

This is only one of 52540 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

New User Registration
Email:
UserID:
Passwd:
Please email me your monthly newsletters, informing the latest services, improvements & surveys.
Please email me a vulnerability test announcement whenever a new test is added.
   Privacy
Registered User Login
 
UserID:   
Passwd:  

 Forgot userid or passwd?
Email/Userid:




Home | About Us | Contact Us | Partner Programs | Developer APIs | Privacy | Mailing Lists | Abuse
Security Audits | Managed DNS | Network Monitoring | Site Analyzer | Internet Research Reports
Web Probe | Whois

© 1998-2016 E-Soft Inc. All rights reserved.