CERTA-2009-AVI-554
Vulnerability from certfr_avis

Plusieurs vulnérabilités dans Wireshark permettant de provoquer un déni de service à distance et de contourner la politique de sécurité ont été corrigées.

Description

Des vulnérabilités dans Wireshark concernant le traitement des protocoles réseau SNA, SMB, SMB2 et IPMI ont été corrigées. Une personne malveillante distante pourrait les exploiter au moyen de trames spécialement réalisées pour provoquer un déni de service ou contourner la politique de sécurité.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Les versions de Wireshark de la 0.9.0 à la 1.2.4 incluses.

Impacted products
Vendor Product Description

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [],
  "affected_systems_content": "\u003cp\u003eLes versions de Wireshark de la 0.9.0 \u00e0  la 1.2.4 incluses.\u003c/p\u003e",
  "content": "## Description\n\nDes vuln\u00e9rabilit\u00e9s dans Wireshark concernant le traitement des\nprotocoles r\u00e9seau SNA, SMB, SMB2 et IPMI ont \u00e9t\u00e9 corrig\u00e9es. Une personne\nmalveillante distante pourrait les exploiter au moyen de trames\nsp\u00e9cialement r\u00e9alis\u00e9es pour provoquer un d\u00e9ni de service ou contourner\nla politique de s\u00e9curit\u00e9.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2009-4376",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-4376"
    },
    {
      "name": "CVE-2009-4377",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-4377"
    },
    {
      "name": "CVE-2009-4378",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-4378"
    }
  ],
  "initial_release_date": "2009-12-18T00:00:00",
  "last_revision_date": "2009-12-24T00:00:00",
  "links": [
    {
      "title": "item Bulletin de s\u00e9curit\u00e9 Fedora FEDORA-2009-13592 du 23      d\u00e9cembre 2009 :",
      "url": "http://www.wireshark.org/security/wnpa-sec-2009-09.html"
    }
  ],
  "reference": "CERTA-2009-AVI-554",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2009-12-18T00:00:00.000000"
    },
    {
      "description": "ajout des r\u00e9f\u00e9rences CVE et de la r\u00e9f\u00e9rence au bulletin de s\u00e9curit\u00e9 Fedora.",
      "revision_date": "2009-12-24T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    }
  ],
  "summary": "Plusieurs vuln\u00e9rabilit\u00e9s dans \u003cspan class=\"textit\"\u003eWireshark\u003c/span\u003e\npermettant de provoquer un d\u00e9ni de service \u00e0 distance et de contourner\nla politique de s\u00e9curit\u00e9 ont \u00e9t\u00e9 corrig\u00e9es.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans Wireshark",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2009-09 du 17 d\u00e9cembre 2009",
      "url": null
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…