Anfälligkeitssuche        Suche in 219043 CVE Beschreibungen
und 99761 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.892110
Kategorie:Debian Local Security Checks
Titel:Debian LTS: Security Advisory for netty-3.9 (DLA-2110-1)
Zusammenfassung:The remote host is missing an update for the 'netty-3.9'; package(s) announced via the DLA-2110-1 advisory.
Beschreibung:Summary:
The remote host is missing an update for the 'netty-3.9'
package(s) announced via the DLA-2110-1 advisory.

Vulnerability Insight:
Several vulnerabilities were discovered in Netty, a Java NIO
client/server socket framework:

CVE-2014-0193

WebSocket08FrameDecoder allows remote attackers to cause a denial
of service (memory consumption) via a TextWebSocketFrame followed
by a long stream of ContinuationWebSocketFrames.

CVE-2014-3488

The SslHandler allows remote attackers to cause a denial of
service (infinite loop and CPU consumption) via a crafted
SSLv2Hello message.

CVE-2019-16869

Netty mishandles whitespace before the colon in HTTP headers (such
as a 'Transfer-Encoding : chunked' line), which leads to HTTP
request smuggling.

CVE-2019-20444

HttpObjectDecoder.java allows an HTTP header that lacks a colon,
which might be interpreted as a separate header with an incorrect
syntax, or might be interpreted as an 'invalid fold.'

CVE-2019-20445

HttpObjectDecoder.java allows a Content-Length header to be
accompanied by a second Content-Length header, or by a
Transfer-Encoding header.

CVE-2020-7238

Netty allows HTTP Request Smuggling because it mishandles
Transfer-Encoding whitespace (such as a
[space]Transfer-Encoding:chunked line) and a later Content-Length
header.

Affected Software/OS:
'netty-3.9' package(s) on Debian Linux.

Solution:
For Debian 8 'Jessie', these problems have been fixed in version
3.9.0.Final-1+deb8u1.

We recommend that you upgrade your netty-3.9 packages.

CVSS Score:
6.4

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:N

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2014-0193
BugTraq ID: 67182
http://www.securityfocus.com/bid/67182
https://lists.debian.org/debian-lts-announce/2020/02/msg00018.html
https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8@%3Ccommits.pulsar.apache.org%3E
RedHat Security Advisories: RHSA-2014:1019
http://rhn.redhat.com/errata/RHSA-2014-1019.html
RedHat Security Advisories: RHSA-2014:1020
http://rhn.redhat.com/errata/RHSA-2014-1020.html
RedHat Security Advisories: RHSA-2014:1021
http://rhn.redhat.com/errata/RHSA-2014-1021.html
RedHat Security Advisories: RHSA-2014:1351
http://rhn.redhat.com/errata/RHSA-2014-1351.html
RedHat Security Advisories: RHSA-2015:0675
http://rhn.redhat.com/errata/RHSA-2015-0675.html
RedHat Security Advisories: RHSA-2015:0720
http://rhn.redhat.com/errata/RHSA-2015-0720.html
RedHat Security Advisories: RHSA-2015:0765
http://rhn.redhat.com/errata/RHSA-2015-0765.html
http://secunia.com/advisories/58280
http://secunia.com/advisories/59290
Common Vulnerability Exposure (CVE) ID: CVE-2014-3488
http://secunia.com/advisories/59196
Common Vulnerability Exposure (CVE) ID: CVE-2020-7238
Debian Security Information: DSA-4885 (Google Search)
https://www.debian.org/security/2021/dsa-4885
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TS6VX7OMXPDJIU5LRGUAHRK6MENAVJ46/
https://github.com/jdordonezn/CVE-2020-72381/issues/1
https://netty.io/news/
https://lists.apache.org/thread.html/rc8d554aad889d12b140d9fd7d2d6fc2e8716e9792f6f4e4b2cdc2d05@%3Ccommits.cassandra.apache.org%3E
https://lists.apache.org/thread.html/r131e572d003914843552fa45c4398b9903fb74144986e8b107c0a3a7@%3Ccommits.cassandra.apache.org%3E
https://lists.debian.org/debian-lts-announce/2020/02/msg00017.html
https://lists.debian.org/debian-lts-announce/2020/09/msg00003.html
RedHat Security Advisories: RHSA-2020:0497
https://access.redhat.com/errata/RHSA-2020:0497
RedHat Security Advisories: RHSA-2020:0567
https://access.redhat.com/errata/RHSA-2020:0567
RedHat Security Advisories: RHSA-2020:0601
https://access.redhat.com/errata/RHSA-2020:0601
RedHat Security Advisories: RHSA-2020:0605
https://access.redhat.com/errata/RHSA-2020:0605
RedHat Security Advisories: RHSA-2020:0606
https://access.redhat.com/errata/RHSA-2020:0606
RedHat Security Advisories: RHSA-2020:0804
https://access.redhat.com/errata/RHSA-2020:0804
RedHat Security Advisories: RHSA-2020:0805
https://access.redhat.com/errata/RHSA-2020:0805
RedHat Security Advisories: RHSA-2020:0806
https://access.redhat.com/errata/RHSA-2020:0806
RedHat Security Advisories: RHSA-2020:0811
https://access.redhat.com/errata/RHSA-2020:0811
CopyrightCopyright (C) 2020 Greenbone Networks GmbH

Dies ist nur einer von 99761 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2024 E-Soft Inc. Alle Rechte vorbehalten.