CVE-2006-3629
CVSS7.8
发布时间 :2006-07-21 10:03:00
修订时间 :2011-03-28 00:00:00
NMOP    

[原文]Unspecified vulnerability in the MOUNT dissector in Wireshark (aka Ethereal) 0.9.4 to 0.99.0 allows remote attackers to cause a denial of service (memory consumption) via unspecified vectors.


[CNNVD]CNNVD数据暂缺。


[机译]在Wireshark(又名抓包)存在未明漏洞在MOUNT剥离的0.9.4 0.99.0允许远程攻击者可以借助未明向量导致拒绝服务(内存消耗)。

- CVSS (基础分值)

CVSS分值: 7.8 [严重(HIGH)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: COMPLETE [可能导致系统完全宕机]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/a:ethereal_group:ethereal:0.10.8
cpe:/a:ethereal_group:ethereal:0.9.8
cpe:/a:ethereal_group:ethereal:0.10.9
cpe:/a:ethereal_group:ethereal:0.9.11
cpe:/a:ethereal_group:ethereal:0.9.16
cpe:/a:ethereal_group:ethereal:0.9.4
cpe:/a:ethereal_group:ethereal:0.9.5
cpe:/a:ethereal_group:ethereal:0.10.10
cpe:/a:ethereal_group:ethereal:0.10.11
cpe:/a:ethereal_group:ethereal:0.10.1
cpe:/a:ethereal_group:ethereal:0.10.2
cpe:/a:ethereal_group:ethereal:0.10.7
cpe:/a:ethereal_group:ethereal:0.9.12
cpe:/a:ethereal_group:ethereal:0.10.13
cpe:/a:ethereal_group:ethereal:0.9.15
cpe:/a:ethereal_group:ethereal:0.10.0
cpe:/a:ethereal_group:ethereal:0.10.4
cpe:/a:ethereal_group:ethereal:0.10.12
cpe:/a:ethereal_group:ethereal:0.10.5
cpe:/a:ethereal_group:ethereal:0.10.14
cpe:/a:ethereal_group:ethereal:0.10.3
cpe:/a:ethereal_group:ethereal:0.9.7
cpe:/a:ethereal_group:ethereal:0.9.9
cpe:/a:ethereal_group:ethereal:0.9.14
cpe:/a:ethereal_group:ethereal:0.9.10
cpe:/a:ethereal_group:ethereal:0.10.6
cpe:/a:ethereal_group:ethereal:0.9.13
cpe:/a:ethereal_group:ethereal:0.99.0
cpe:/a:ethereal_group:ethereal:0.9.6
cpe:/a:ethereal_group:ethereal:0.10.0a
cpe:/a:ethereal_group:ethereal:0.10

- OVAL (用于检测的技术细节)

oval:org.mitre.oval:def:10492Unspecified vulnerability in the MOUNT dissector in Wireshark (aka Ethereal) 0.9.4 to 0.99.0 allows remote attackers to cause a denial of se...
*OVAL详细的描述了检测该漏洞的方法,你可以从相关的OVAL定义中找到更多检测该漏洞的技术细节。

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3629
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-3629
(官方数据源) NVD

- 其它链接及资源

http://www.wireshark.org/security/wnpa-sec-2006-01.html
(VENDOR_ADVISORY)  CONFIRM  http://www.wireshark.org/security/wnpa-sec-2006-01.html
https://issues.rpath.com/browse/RPL-512
(UNKNOWN)  CONFIRM  https://issues.rpath.com/browse/RPL-512
http://xforce.iss.net/xforce/xfdb/27826
(UNKNOWN)  XF  wireshark-mount-dos(27826)
http://www.vupen.com/english/advisories/2006/2850
(VENDOR_ADVISORY)  VUPEN  ADV-2006-2850
http://www.securityfocus.com/bid/19051
(UNKNOWN)  BID  19051
http://www.securityfocus.com/archive/1/archive/1/440576/100/0/threaded
(UNKNOWN)  BUGTRAQ  20060719 rPSA-2006-0132-1 tshark wireshark
http://www.osvdb.org/27365
(UNKNOWN)  OSVDB  27365
http://www.novell.com/linux/security/advisories/2006_20_sr.html
(UNKNOWN)  SUSE  SUSE-SR:2006:020
http://www.mandriva.com/security/advisories?name=MDKSA-2006:128
(UNKNOWN)  MANDRIVA  MDKSA-2006:128
http://www.debian.org/security/2006/dsa-1127
(UNKNOWN)  DEBIAN  DSA-1127
http://support.avaya.com/elmodocs2/security/ASA-2006-197.htm
(UNKNOWN)  CONFIRM  http://support.avaya.com/elmodocs2/security/ASA-2006-197.htm
http://securitytracker.com/id?1016532
(UNKNOWN)  SECTRACK  1016532
http://security.gentoo.org/glsa/glsa-200607-09.xml
(UNKNOWN)  GENTOO  GLSA-200607-09
http://secunia.com/advisories/22089
(VENDOR_ADVISORY)  SECUNIA  22089
http://secunia.com/advisories/21598
(VENDOR_ADVISORY)  SECUNIA  21598
http://secunia.com/advisories/21488
(VENDOR_ADVISORY)  SECUNIA  21488
http://secunia.com/advisories/21467
(VENDOR_ADVISORY)  SECUNIA  21467
http://secunia.com/advisories/21249
(VENDOR_ADVISORY)  SECUNIA  21249
http://secunia.com/advisories/21204
(VENDOR_ADVISORY)  SECUNIA  21204
http://secunia.com/advisories/21121
(VENDOR_ADVISORY)  SECUNIA  21121
http://secunia.com/advisories/21107
(VENDOR_ADVISORY)  SECUNIA  21107
http://secunia.com/advisories/21078
(VENDOR_ADVISORY)  SECUNIA  21078
http://rhn.redhat.com/errata/RHSA-2006-0602.html
(UNKNOWN)  REDHAT  RHSA-2006:0602
ftp://patches.sgi.com/support/free/security/advisories/20060801-01-P
(UNKNOWN)  SGI  20060801-01-P

- 漏洞信息 (F48757)

Debian Linux Security Advisory 1127-1 (PacketStormID:F48757)
2006-08-03 00:00:00
Debian  debian.org
advisory,remote,arbitrary,vulnerability
linux,debian
CVE-2006-3628,CVE-2006-3629,CVE-2006-3630,CVE-2006-3631,CVE-2006-3632
[点击下载]

Debian Security Advisory 1127-1 - Several remote vulnerabilities have been discovered in the Ethereal network sniffer, which may lead to the execution of arbitrary code.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- --------------------------------------------------------------------------
Debian Security Advisory DSA 1127-1                    security@debian.org
http://www.debian.org/security/                         Moritz Muehlenhoff
July 28th, 2006                         http://www.debian.org/security/faq
- --------------------------------------------------------------------------

Package        : ethereal
Vulnerability  : several
Problem-Type   : remote
Debian-specific: no
CVE ID         : CVE-2006-3628 CVE-2006-3629 CVE-2006-3630 CVE-2006-3631 CVE-2006-3632
Debian Bug     : 373913 375694

Several remote vulnerabilities have been discovered in the Ethereal network
sniffer, which may lead to the execution of arbitrary code. The Common
Vulnerabilities and Exposures project identifies the following problems:

CVE-2006-3628

    Ilja van Sprundel discovered that the FW-1 and MQ dissectors are
    vulnerable to format string attacks.

CVE-2006-3629

    Ilja van Sprundel discovered that the MOUNT dissector is vulnerable
    to denial of service through memory exhaustion.

CVE-2006-3630

    Ilja van Sprundel discovered off-by-one overflows in the NCP NMAS and
    NDPS dissectors.

CVE-2006-3631

    Ilja van Sprundel discovered a buffer overflow in the NFS dissector.

CVE-2006-3632

    Ilja van Sprundel discovered that the SSH dissector is vulnerable
    to denial of service through an infinite loop.

For the stable distribution (sarge) these problems have been fixed in
version 0.10.10-2sarge6.

For the unstable distribution (sid) these problems have been fixed in
version 0.99.2-1 of wireshark, the sniffer formerly known as ethereal.

We recommend that you upgrade your ethereal packages.


Upgrade Instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 3.1 alias sarge
- --------------------------------

  Source archives:

    http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.10.10-2sarge6.dsc
      Size/MD5 checksum:      855 c707f586104e8686d9d2244ce2d7a506
    http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.10.10-2sarge6.diff.gz
      Size/MD5 checksum:   173252 9c9821b8ebead45753446356c22cb578
    http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.10.10.orig.tar.gz
      Size/MD5 checksum:  7411510 e6b74468412c17bb66cd459bfb61471c

  Alpha architecture:

    http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.10.10-2sarge6_alpha.deb
      Size/MD5 checksum:   542792 15de1eb27365d6cae79d8d702e090f13
    http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.10.10-2sarge6_alpha.deb
      Size/MD5 checksum:  5475590 bef681e66102e67d36b7e6a42c2c2c3f
    http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.10.10-2sarge6_alpha.deb
      Size/MD5 checksum:   154412 847bd247de53a90c7280043bedac7d93
    http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.10.10-2sarge6_alpha.deb
      Size/MD5 checksum:   106004 bee2da8a58d6e84c05b6a80537183694

  AMD64 architecture:

    http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.10.10-2sarge6_amd64.deb
      Size/MD5 checksum:   486278 e6239c6efadea1399ad1fcab5a0da5f3
    http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.10.10-2sarge6_amd64.deb
      Size/MD5 checksum:  5333976 61bcb38c72686eeb7e8587179ab7594f
    http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.10.10-2sarge6_amd64.deb
      Size/MD5 checksum:   154406 a13fdfd340be02a602f6fc576f166005
    http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.10.10-2sarge6_amd64.deb
      Size/MD5 checksum:    99298 7dd892a57430d66f7c97088b8c1eb187

  ARM architecture:

    http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.10.10-2sarge6_arm.deb
      Size/MD5 checksum:   472738 a10f7886e67d41949ec8488715276ca7
    http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.10.10-2sarge6_arm.deb
      Size/MD5 checksum:  4687198 d18c46329bf526579e7c1af409323610
    http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.10.10-2sarge6_arm.deb
      Size/MD5 checksum:   154434 5c23b40f20e4079a6c58c697914b54ef
    http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.10.10-2sarge6_arm.deb
      Size/MD5 checksum:    95276 a56fa4124bd4193ec75bdedeaefcb47b

  Intel IA-32 architecture:

    http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.10.10-2sarge6_i386.deb
      Size/MD5 checksum:   443394 e72fd2ff7eec3cbd08fc07ed9458aada
    http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.10.10-2sarge6_i386.deb
      Size/MD5 checksum:  4495996 9e1aebd1a408bf7472608917660ce9aa
    http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.10.10-2sarge6_i386.deb
      Size/MD5 checksum:   154398 d84eaeb2fae751e3b36046e87c1981e1
    http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.10.10-2sarge6_i386.deb
      Size/MD5 checksum:    90684 c699e114b221acd10350cf8b51c608b9

  Intel IA-64 architecture:

    http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.10.10-2sarge6_ia64.deb
      Size/MD5 checksum:   674208 354b3cc9866e6fefe48b38925a48ae32
    http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.10.10-2sarge6_ia64.deb
      Size/MD5 checksum:  6628612 e72ee2bfd8b6997a121c8a95b6742e4f
    http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.10.10-2sarge6_ia64.deb
      Size/MD5 checksum:   154382 da6b4cf3246a63b4b8b94bc0db6d3dac
    http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.10.10-2sarge6_ia64.deb
      Size/MD5 checksum:   128860 370f38c0c53088195b7418d3af996d35

  HP Precision architecture:

    http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.10.10-2sarge6_hppa.deb
      Size/MD5 checksum:   489076 bf76e69441ef032d5d8ad8420b5b25b8
    http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.10.10-2sarge6_hppa.deb
      Size/MD5 checksum:  5786654 7e88aabad273d3dd0e239f78ecc35491
    http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.10.10-2sarge6_hppa.deb
      Size/MD5 checksum:   154442 325e842eae1b96b8a33ec8ae025739e2
    http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.10.10-2sarge6_hppa.deb
      Size/MD5 checksum:    98192 7400d5ce588c3899f6e2b43f945bde6e

  Motorola 680x0 architecture:

    http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.10.10-2sarge6_m68k.deb
      Size/MD5 checksum:   447546 489e9c8ae8069112a937c8a26d297709
    http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.10.10-2sarge6_m68k.deb
      Size/MD5 checksum:  5564820 636aff3dca750cb3ac139c21404c49a1
    http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.10.10-2sarge6_m68k.deb
      Size/MD5 checksum:   154472 776225c24043d3056c5b45914f24450a
    http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.10.10-2sarge6_m68k.deb
      Size/MD5 checksum:    90680 98475c71576aaee068be4ff5353050fe

  Big endian MIPS architecture:

    http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.10.10-2sarge6_mips.deb
      Size/MD5 checksum:   462502 716d233fbf38161464290950590a071f
    http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.10.10-2sarge6_mips.deb
      Size/MD5 checksum:  4723270 60f129963a2ce9ffbd599b60cfba11cd
    http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.10.10-2sarge6_mips.deb
      Size/MD5 checksum:   154406 386b68e0403f729687d82786afb0241d
    http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.10.10-2sarge6_mips.deb
      Size/MD5 checksum:    94498 af2ed192e6d4690d263f01127a8edfee

  Little endian MIPS architecture:

    http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.10.10-2sarge6_mipsel.deb
      Size/MD5 checksum:   457750 ef72d36a3f9fa3945a98c14abc62e2ce
    http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.10.10-2sarge6_mipsel.deb
      Size/MD5 checksum:  4459970 36bf7f5d57e23e14d1ade0bf9f9d49b0
    http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.10.10-2sarge6_mipsel.deb
      Size/MD5 checksum:   154416 5d36a2d02f29374ef45bcdb1597423c5
    http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.10.10-2sarge6_mipsel.deb
      Size/MD5 checksum:    94410 c585ae00dadccef338c292c1a2c268f9

  PowerPC architecture:

    http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.10.10-2sarge6_powerpc.deb
      Size/MD5 checksum:   455484 893d1f6bbc3097840ba7e53cc542bbee
    http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.10.10-2sarge6_powerpc.deb
      Size/MD5 checksum:  5067540 e17cde3f8ff57a31a12270cb5d701257
    http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.10.10-2sarge6_powerpc.deb
      Size/MD5 checksum:   154414 7b51770205dc37fc2fde1fd9ca344dda
    http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.10.10-2sarge6_powerpc.deb
      Size/MD5 checksum:    94112 7a49b609694e1eea450e621da3b2bc1f

  IBM S/390 architecture:

    http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.10.10-2sarge6_s390.deb
      Size/MD5 checksum:   479470 528b47d9a5c453856edd9b6df28ebae7
    http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.10.10-2sarge6_s390.deb
      Size/MD5 checksum:  5620570 874edf4f0f86ab3aee3f48a55f95f0d0
    http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.10.10-2sarge6_s390.deb
      Size/MD5 checksum:   154400 86f2d581fa46af34788e0629c6e62ec5
    http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.10.10-2sarge6_s390.deb
      Size/MD5 checksum:    99696 1b622377fb056fe37b8104d295e56d28

  Sun Sparc architecture:

    http://security.debian.org/pool/updates/main/e/ethereal/ethereal_0.10.10-2sarge6_sparc.deb
      Size/MD5 checksum:   465138 ad9fd25554415ff19dba6b89b5d48513
    http://security.debian.org/pool/updates/main/e/ethereal/ethereal-common_0.10.10-2sarge6_sparc.deb
      Size/MD5 checksum:  5129848 f1a7015616428128a1c65394226a87fe
    http://security.debian.org/pool/updates/main/e/ethereal/ethereal-dev_0.10.10-2sarge6_sparc.deb
      Size/MD5 checksum:   154424 ff78808097ae2bc2b4ed753f1b76f1b9
    http://security.debian.org/pool/updates/main/e/ethereal/tethereal_0.10.10-2sarge6_sparc.deb
      Size/MD5 checksum:    93600 a97f833739a88b5484b59989be966d0d


  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.3 (GNU/Linux)

iD8DBQFEyaMXXm3vHE4uyloRAvMLAKCmEhnqBdURa2zVfJoWKPWjj/wIJwCdFE3B
2nDYi9cpb0AmiNjuFJjUcLs=
=hiNY
-----END PGP SIGNATURE-----


    

- 漏洞信息 (F48440)

rPSA-2006-0132-1.txt (PacketStormID:F48440)
2006-07-24 00:00:00
 
advisory,root,vulnerability
CVE-2006-3627,CVE-2006-3628,CVE-2006-3629,CVE-2006-3630,CVE-2006-3631,CVE-2006-3632
[点击下载]

rPath Security Advisory - All versions of the ethereal and tethereal packages contain vulnerabilities in packet dissector modules, which may allow various attacks including subverting the user who is running ethereal. Since ethereal is generally run as root to view network traffic directly, this may allow complete access to the vulnerable system.

rPath Security Advisory: 2006-0132-1
Published: 2006-07-19
Products: rPath Linux 1
Rating: Severe
Exposure Level Classification:
    Remote Root Deterministic Unauthorized Access
Updated Versions:
    wireshark=/conary.rpath.com@rpl:devel//1/0.99.2-2.2-1
    tshark=/conary.rpath.com@rpl:devel//1/0.99.2-2.2-1

References:
    http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3627
    http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3628
    http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3629
    http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3630
    http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3631
    http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3632
    http://www.wireshark.org/security/wnpa-sec-2006-01.html

Description:
    All versions of the ethereal and tethereal packages contain
    vulnerabilities in packet dissector modules, which may allow various
    attacks including subverting the user who is running ethereal.
    Since ethereal is generally run as root to view network traffic
    directly, this may allow complete access to the vulnerable system.
    
    The fixes are available only as part of the wireshark package.
    Development of the ethereal program has ceased under the ethereal
    name and continued under the wireshark name, due to restrictions
    on the use of the "ethereal" trademark.  The latest version of the
    ethereal and tethereal packages in rPath Linux 1 are now redirects
    to the wireshark and tshark packages.  The command "conary update
    ethereal tethereal" will cause the ethereal and tethereal packages
    on the system to be replaced by wireshark and tshark, respectively.
    The "conary updateall" command will also appropriately migrate the
    system from ethereal to wireshark.
    
    The fix for this vulnerability is available in the wireshark and
    tshark packages.  rPath strongly recommends that you update to
    the wireshark and/or tshark packages, and that you not use the
    affected ethereal and tethereal packages, particularly not on
    untrusted networks or trace files.
    

- 漏洞信息 (F48411)

Mandriva Linux Security Advisory 2006.128 (PacketStormID:F48411)
2006-07-20 00:00:00
Mandriva  mandriva.com
advisory,vulnerability
linux,mandriva
CVE-2006-3627,CVE-2006-3628,CVE-2006-3629,CVE-2006-3630,CVE-2006-3631,CVE-2006-3632
[点击下载]

Mandriva Linux Security Advisory MDKSA-2006-128 - A number of vulnerabilities have been discovered in the Wireshark (formerly Ethereal) network analyzer. These issues have been corrected in Wireshark version 0.99.2.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________
 
 Mandriva Linux Security Advisory                         MDKSA-2006:128
 http://www.mandriva.com/security/
 _______________________________________________________________________
 
 Package : wireshark
 Date    : July 18, 2006
 Affected: 2006.0
 _______________________________________________________________________
 
 Problem Description:
 
 A number of vulnerabilities have been discovered in the Wireshark
 (formerly Ethereal) network analyzer.  These issues have been corrected
 in Wireshark version 0.99.2 which is provided with this update.
 _______________________________________________________________________

 References:
 
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3627
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3628
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3629
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3630
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3631
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3632
 http://www.wireshark.org/security/wnpa-sec-2006-01.html
 _______________________________________________________________________
 
 Updated Packages:
 
 Mandriva Linux 2006.0:
 19db98ffa6a1cfb9cc5470abc643f72a  2006.0/RPMS/libwireshark0-0.99.2-0.2.20060mdk.i586.rpm
 e4574371aa3f0bc1845d82a130bf6f4b  2006.0/RPMS/tshark-0.99.2-0.2.20060mdk.i586.rpm
 54b30ad47d17134a6891c6b7c1810b18  2006.0/RPMS/wireshark-0.99.2-0.2.20060mdk.i586.rpm
 03c7673e7f4efd24854c4d51dff87cab  2006.0/RPMS/wireshark-tools-0.99.2-0.2.20060mdk.i586.rpm
 14c59524c2a536634385791902ef53a4  2006.0/SRPMS/wireshark-0.99.2-0.2.20060mdk.src.rpm

 Mandriva Linux 2006.0/X86_64:
 18dbc67899b2c023af06524a67b2d07a  x86_64/2006.0/RPMS/lib64wireshark0-0.99.2-0.2.20060mdk.x86_64.rpm
 b5187418a5f9ab70a59eddb3611f0b15  x86_64/2006.0/RPMS/tshark-0.99.2-0.2.20060mdk.x86_64.rpm
 f98f5805acf0756ce762e6b10af81506  x86_64/2006.0/RPMS/wireshark-0.99.2-0.2.20060mdk.x86_64.rpm
 da05fcb2a00bf682c85da21159fd3af0  x86_64/2006.0/RPMS/wireshark-tools-0.99.2-0.2.20060mdk.x86_64.rpm
 14c59524c2a536634385791902ef53a4  x86_64/2006.0/SRPMS/wireshark-0.99.2-0.2.20060mdk.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.2 (GNU/Linux)

iD8DBQFEvVp1mqjQ0CJFipgRAqpxAJ9fAQNXIFh65twMu3Q9c1jK5XUCJACZAeLX
M3e2Dpv4v3glOdT6hIB2HqI=
=SKwo
-----END PGP SIGNATURE-----

    

- 漏洞信息

27365
Wireshark MOUNT Dissector Memory Exhaustion DoS
Remote / Network Access Denial of Service
Loss of Availability
Exploit Unknown

- 漏洞描述

The Wireshark MOUNT dissector contains a flaw that may allow a remote denial of service. The issue is triggered by a malformed packet or trace file, and will result in loss of availability for the application.

- 时间线

2006-07-17 Unknow
Unknow Unknow

- 解决方案

Upgrade to version 0.99.2 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站