CVE编号
CVE-2007-3390利用情况
暂无补丁情况
官方补丁披露时间
2007-06-26漏洞描述
Wireshark 0.99.5和0.10.x至0.10.14,在某些系统上运行时,允许远程攻击者通过精心设计的触发SIGTRAP的iSeries capture 文件导致拒绝服务(崩溃)。解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接 |
|
---|---|
http://osvdb.org/37642 | |
http://secunia.com/advisories/25833 | |
http://secunia.com/advisories/25877 | |
http://secunia.com/advisories/25987 | |
http://secunia.com/advisories/26004 | |
http://secunia.com/advisories/26499 | |
http://secunia.com/advisories/28583 | |
http://security.gentoo.org/glsa/glsa-200708-12.xml | |
http://www.debian.org/security/2007/dsa-1322 | |
http://www.mandriva.com/security/advisories?name=MDKSA-2007:145 | |
http://www.novell.com/linux/security/advisories/2007_15_sr.html | |
http://www.redhat.com/support/errata/RHSA-2007-0709.html | |
http://www.redhat.com/support/errata/RHSA-2007-0710.html | |
http://www.redhat.com/support/errata/RHSA-2008-0059.html | |
http://www.securityfocus.com/bid/24662 | |
http://www.securitytracker.com/id?1018315 | |
http://www.vupen.com/english/advisories/2007/2353 | |
http://www.wireshark.org/docs/relnotes/wireshark-0.99.6.html | |
http://www.wireshark.org/security/wnpa-sec-2007-02.html | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/35205 | |
https://issues.rpath.com/browse/RPL-1498 | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.ova... |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | wireshark | wireshark | 0.10 | - | |||||
运行在以下环境 | |||||||||
应用 | wireshark | wireshark | 0.10.1 | - | |||||
运行在以下环境 | |||||||||
应用 | wireshark | wireshark | 0.10.10 | - | |||||
运行在以下环境 | |||||||||
应用 | wireshark | wireshark | 0.10.11 | - | |||||
运行在以下环境 | |||||||||
应用 | wireshark | wireshark | 0.10.12 | - | |||||
运行在以下环境 | |||||||||
应用 | wireshark | wireshark | 0.10.13 | - | |||||
运行在以下环境 | |||||||||
应用 | wireshark | wireshark | 0.10.14 | - | |||||
运行在以下环境 | |||||||||
应用 | wireshark | wireshark | 0.10.2 | - | |||||
运行在以下环境 | |||||||||
应用 | wireshark | wireshark | 0.10.3 | - | |||||
运行在以下环境 | |||||||||
应用 | wireshark | wireshark | 0.10.4 | - | |||||
运行在以下环境 | |||||||||
应用 | wireshark | wireshark | 0.10.5 | - | |||||
运行在以下环境 | |||||||||
应用 | wireshark | wireshark | 0.10.6 | - | |||||
运行在以下环境 | |||||||||
应用 | wireshark | wireshark | 0.10.7 | - | |||||
运行在以下环境 | |||||||||
应用 | wireshark | wireshark | 0.10.8 | - | |||||
运行在以下环境 | |||||||||
应用 | wireshark | wireshark | 0.10.9 | - | |||||
运行在以下环境 | |||||||||
应用 | wireshark | wireshark | 0.99.5 | - | |||||
运行在以下环境 | |||||||||
系统 | debian_4.0 | wireshark | * |
Up to (excluding) 0.99.4-5.etch.0 |
|||||
运行在以下环境 | |||||||||
系统 | oracle_5 | wireshark | * |
Up to (excluding) 0.99.6-1.el5.0.1 |
- 攻击路径 远程
- 攻击复杂度 容易
- 权限要求 无需权限
- 影响范围 全局影响
- EXP成熟度 未验证
- 补丁情况 官方补丁
- 数据保密性 无影响
- 数据完整性 无影响
- 服务器危害 DoS
- 全网数量 N/A
还没有评论,来说两句吧...