CERTA-2006-AVI-301

Vulnerability from certfr_avis - Published: - Updated:

None

Description

Wirehsark est un analyseur de trafic réseau qui succède à Ethereal. Plusieurs vulnérabilités ont été identifiées dans celui-ci ainsi que les versions Ethereal précédentes. Il s'agit pour la majorité de débordements de mémoire. Un utilisateur malveillant peut utiliser l'une d'entre elles pour construire un paquet spécial, qui provoquera le dysfonctionnement, voir l'interruption de l'application. Sous certaines conditions, une exécution de code à distance est également possible.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Les versions de Wireshark (anciennement Ethereal) antérieures à la version 0.99.2.

Impacted products
Vendor Product Description

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [],
  "affected_systems_content": "\u003cP\u003eLes versions de Wireshark (anciennement Ethereal) ant\u00e9rieures  \u00e0 la version 0.99.2.\u003c/P\u003e",
  "content": "## Description\n\nWirehsark est un analyseur de trafic r\u00e9seau qui succ\u00e8de \u00e0 Ethereal.\nPlusieurs vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 identifi\u00e9es dans celui-ci ainsi que les\nversions Ethereal pr\u00e9c\u00e9dentes. Il s\u0027agit pour la majorit\u00e9 de\nd\u00e9bordements de m\u00e9moire. Un utilisateur malveillant peut utiliser l\u0027une\nd\u0027entre elles pour construire un paquet sp\u00e9cial, qui provoquera le\ndysfonctionnement, voir l\u0027interruption de l\u0027application. Sous certaines\nconditions, une ex\u00e9cution de code \u00e0 distance est \u00e9galement possible.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2006-3631",
      "url": "https://www.cve.org/CVERecord?id=CVE-2006-3631"
    },
    {
      "name": "CVE-2006-3629",
      "url": "https://www.cve.org/CVERecord?id=CVE-2006-3629"
    },
    {
      "name": "CVE-2006-3628",
      "url": "https://www.cve.org/CVERecord?id=CVE-2006-3628"
    },
    {
      "name": "CVE-2006-3627",
      "url": "https://www.cve.org/CVERecord?id=CVE-2006-3627"
    },
    {
      "name": "CVE-2006-3630",
      "url": "https://www.cve.org/CVERecord?id=CVE-2006-3630"
    },
    {
      "name": "CVE-2006-3632",
      "url": "https://www.cve.org/CVERecord?id=CVE-2006-3632"
    }
  ],
  "links": [
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Avaya ASA-2006-197 du 22 septembre    2006 :",
      "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-197.htm"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 SuSE SUSA-SA:2006:020 du 16 ao\u00fbt 2006    :",
      "url": "http://lists.suse.com/archive/suse-security-announce/2006-Aug/0006.html"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Gentoo GLSA-200607-09 du 25 juillet    2006 :",
      "url": "http://www.gentoo.org/en/glsa/glsa-200607-09.xml"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2006:0602 du 16 ao\u00fbt 2006    :",
      "url": "http://rhn.redhat.com/errata/RHSA-2006-0602.html"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Debian DSA-1127 du 28 juillet 2006 :",
      "url": "http://www.us.debian.org/security/dsa-1127/"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Mandriva MDKSA-2006:128 du 18 juillet    2006 :",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:128"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Wireshark WNPA-SEC-2006-01 du 17    juillet 2006 :",
      "url": "http://www.wireshark.org/security/wnpa-sec-2006-01.html"
    },
    {
      "title": "Site du projet Wireshark :",
      "url": "http://www.wireshark.org"
    }
  ],
  "reference": "CERTA-2006-AVI-301",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2006-07-19T00:00:00.000000"
    },
    {
      "description": "ajout des r\u00e9f\u00e9rences aux bulletins de s\u00e9curit\u00e9 Debian, Gentoo et Mandriva.",
      "revision_date": "2006-08-02T00:00:00.000000"
    },
    {
      "description": "ajout des r\u00e9f\u00e9rences aux bulletins de s\u00e9curit\u00e9 Avaya, SuSE et Red Hat.",
      "revision_date": "2006-09-28T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    }
  ],
  "summary": null,
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans Ethereal/Wireshark",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Wireshark du 17 juillet 2006",
      "url": null
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…