Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Mandrake Local Security Checks >> MDKSA-2007:033: wireshark


Vulnerability Assessment Details

MDKSA-2007:033: wireshark

Vulnerability Assessment Summary
Check for the version of the wireshark package

Detailed Explanation for this Vulnerability Assessment

The remote host is missing the patch for the advisory MDKSA-2007:033 (wireshark).

Vulnerabilities in the LLT, IEEE 802.11, HTTP, and TCP dissectors were
discovered in versions of wireshark less than 0.99.5, as well as
various other bugs.
This updated provides wireshark 0.99.5 which is not vulnerable to these
issues.

Solution : http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2007:033
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2007 Tenable Network Security

Cables, Connectors

Dell PowerEdge R610 Rack Server 2x Intel Xeon CPU 36GB RAM 2x160GB HDD Linux
$199.99
Dell PowerEdge R610 Rack Server 2x Intel Xeon CPU 36GB RAM 2x160GB HDD Linux pictureDell PowerEdge R510 Rack Server Intel Xeon CPU 32GB RAM 300GB HDD Linux
$199.99
Dell PowerEdge R510 Rack Server Intel Xeon CPU 32GB RAM 300GB HDD Linux pictureUXS Server Linux 1U Open Source AES-NI 12 Cores Ubuntu Server 16 OS 2x 3Ghz 96GB
$750.0
UXS Server Linux 1U Open Source AES-NI 12 Cores Ubuntu Server 16 OS 2x 3Ghz 96GB pictureMRV LX-4048S-001 Linux based 48-Port Terminal Server IN-REACH LX AC + Warranty
$595.0
MRV LX-4048S-001 Linux based 48-Port Terminal Server IN-REACH LX AC + Warranty picture


Discussions

No Discussions have been posted on this vulnerability.