Anfälligkeitssuche        Suche in 219043 CVE Beschreibungen
und 99761 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.806029
Kategorie:Denial of Service
Titel:Wireshark Multiple Denial-of-Service Vulnerabilities-01 August15 (Windows)
Zusammenfassung:This host is installed with Wireshark; and is prone to multiple denial of service vulnerabilities.
Beschreibung:Summary:
This host is installed with Wireshark
and is prone to multiple denial of service vulnerabilities.

Vulnerability Insight:
Multiple flaws exist due to:

- An error in 'proto_tree_add_bytes_item' function in 'epan/proto.c' script in
the protocol-tree implementation.

- An error in 'wmem_block_split_free_chunk' function in
'epan/wmem/wmem_allocator_block.c' script in the wmem block allocator in the
memory manager.

- An error in 'dissector-table' implementation in 'epan/packet.c' script
which mishandles table searches for empty strings.

- An error in 'dissect_zbee_secure' function in
'epan/dissectors/packet-zbee-security.c' script in the ZigBee dissector.

- Mishandling of datatype by 'epan/dissectors/packet-gsm_rlcmac.c' script in
the GSM RLC/MAC dissector.

- An error in 'dissect_wa_payload' function in
'epan/dissectors/packet-waveagent.c' script in the WaveAgent dissector.

- Improper input validation of offset value by 'dissect_openflow_tablemod_v5'
function in 'epan/dissectors/packet-openflow_v5.c' script.

- Invalid data length checking by 'ptvcursor_add' function in the ptvcursor
implementation in 'epan/proto.c' script.

- An error in 'dissect_wccp2r1_address_table_info' function in
'epan/dissectors/packet-wccp.c' script.

Vulnerability Impact:
Successful exploitation will allow remote
attackers to conduct denial of service attack.

Affected Software/OS:
Wireshark version 1.12.x before 1.12.7
on Windows

Solution:
Upgrade Wireshark to version 1.12.7 or
later.

CVSS Score:
4.3

CVSS Vector:
AV:N/AC:M/Au:N/C:N/I:N/A:P

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2015-6241
Debian Security Information: DSA-3367 (Google Search)
http://www.debian.org/security/2015/dsa-3367
http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168837.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165509.html
http://www.securitytracker.com/id/1033272
SuSE Security Announcement: openSUSE-SU-2015:1836 (Google Search)
http://lists.opensuse.org/opensuse-updates/2015-10/msg00053.html
Common Vulnerability Exposure (CVE) ID: CVE-2015-6242
Common Vulnerability Exposure (CVE) ID: CVE-2015-6243
BugTraq ID: 76384
http://www.securityfocus.com/bid/76384
Common Vulnerability Exposure (CVE) ID: CVE-2015-6244
BugTraq ID: 76383
http://www.securityfocus.com/bid/76383
Common Vulnerability Exposure (CVE) ID: CVE-2015-6245
BugTraq ID: 76382
http://www.securityfocus.com/bid/76382
Common Vulnerability Exposure (CVE) ID: CVE-2015-6246
BugTraq ID: 76381
http://www.securityfocus.com/bid/76381
Common Vulnerability Exposure (CVE) ID: CVE-2015-6247
Common Vulnerability Exposure (CVE) ID: CVE-2015-6248
BugTraq ID: 76387
http://www.securityfocus.com/bid/76387
Common Vulnerability Exposure (CVE) ID: CVE-2015-6249
CopyrightCopyright (C) 2015 Greenbone Networks GmbH

Dies ist nur einer von 99761 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2024 E-Soft Inc. Alle Rechte vorbehalten.