
CVE-2020-26575 – Gentoo Linux Security Advisory 202011-08
https://notcve.org/view.php?id=CVE-2020-26575
06 Oct 2020 — In Wireshark through 3.2.7, the Facebook Zero Protocol (aka FBZERO) dissector could enter an infinite loop. This was addressed in epan/dissectors/packet-fbzero.c by correcting the implementation of offset advancement. En Wireshark versiones hasta 3.2.7, el Facebook Zero Protocol (también se conoce como FBZERO), podría entrar en un bucle infinito. Esto fue abordado en el archivo epan/dissectors/packet-fbzero.c corrigiendo la implementación del avance de compensación Multiple vulnerabilities have been fo... • https://gitlab.com/wireshark/wireshark/-/commit/3ff940652962c099b73ae3233322b8697b0d10ab • CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') •

CVE-2018-14438
https://notcve.org/view.php?id=CVE-2018-14438
20 Jul 2018 — In Wireshark through 2.6.2, the create_app_running_mutex function in wsutil/file_util.c calls SetSecurityDescriptorDacl to set a NULL DACL, which allows attackers to modify the access control arbitrarily. En Wireshark hasta la versión 2.6.2, la función create_app_running_mutex en wsutil/file_util.c llama a SetSecurityDescriptorDacl para establecer un DACL NULL que permite que los atacantes modifiquen el control de acceso de forma arbitraria. • http://www.securityfocus.com/bid/104876 • CWE-20: Improper Input Validation •

CVE-2018-6836
https://notcve.org/view.php?id=CVE-2018-6836
08 Feb 2018 — The netmonrec_comment_destroy function in wiretap/netmon.c in Wireshark through 2.4.4 performs a free operation on an uninitialized memory address, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact. La función netmonrec_comment_destroy en wiretap/netmon.c en Wireshark, hasta la versión 2.4.4, realiza una operación de liberación en una dirección de memoria no inicializada, lo que permite que atacantes remotos provoquen una denegación de s... • https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14397 • CWE-763: Release of Invalid Pointer or Reference •

CVE-2017-17997
https://notcve.org/view.php?id=CVE-2017-17997
30 Dec 2017 — In Wireshark before 2.2.12, the MRDISC dissector misuses a NULL pointer and crashes. This was addressed in epan/dissectors/packet-mrdisc.c by validating an IPv4 address. This vulnerability is similar to CVE-2017-9343. En Wireshark, en versiones anteriores a la 2.2.12, el disector MRDISC emplea de forma incorrecta un puntero NULL y se cierra inesperadamente. Esto se trató en epan/dissectors/packet-mrdisc.c validando la longitud de una dirección IPv4. • https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14299 • CWE-476: NULL Pointer Dereference •

CVE-2017-17935
https://notcve.org/view.php?id=CVE-2017-17935
27 Dec 2017 — The File_read_line function in epan/wslua/wslua_file.c in Wireshark through 2.2.11 does not properly strip '\n' characters, which allows remote attackers to cause a denial of service (buffer underflow and application crash) via a crafted packet that triggers the attempted processing of an empty line. La función File_read_line en epan/wslua/wslua_file.c en Wireshark hasta la versión 2.2.11 no elimina correctamente caracteres "\n", lo que permite que atacantes remotos provoquen una denegación de servicio (sub... • http://www.securityfocus.com/bid/102311 • CWE-125: Out-of-bounds Read •

CVE-2017-6014 – Debian Security Advisory 3811-1
https://notcve.org/view.php?id=CVE-2017-6014
17 Feb 2017 — In Wireshark 2.2.4 and earlier, a crafted or malformed STANAG 4607 capture file will cause an infinite loop and memory exhaustion. If the packet size field in a packet header is null, the offset to read from will not advance, causing continuous attempts to read the same zero length packet. This will quickly exhaust all system memory. En Wireshark 2.2.4 y versiones anteriores, un archivo de captura STANAG 4607 manipulado o mal formado causará un bucle infinito y agotamiento de memoria. Si el campo de tamaño ... • http://www.debian.org/security/2017/dsa-3811 • CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') •

CVE-2011-2597 – wireshark: infinite loop DoS in lucent/ascend file parser
https://notcve.org/view.php?id=CVE-2011-2597
07 Jul 2011 — The Lucent/Ascend file parser in Wireshark 1.2.x before 1.2.18, 1.4.x through 1.4.7, and 1.6.0 allows remote attackers to cause a denial of service (infinite loop) via malformed packets. El analizador de archivos en Wireshark de Lucent/Ascend v1.2.x antes de v1.2.18, v1.4.x a v1.4.7, y v1.6.0 permite a atacantes remotos causar una denegación de servicio (por un bucle infinito) a través de paquetes mal formados. • http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063586.html • CWE-399: Resource Management Errors CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') •

CVE-2011-1958 – (64bit): NULL pointer dereference by processing of a corrupted Diameter dictionary file
https://notcve.org/view.php?id=CVE-2011-1958
06 Jun 2011 — Wireshark 1.2.x before 1.2.17 and 1.4.x before 1.4.7 allows user-assisted remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted Diameter dictionary file. Wireshark v1.2.x antes de v1.2.17 y v1.4.x antes de v1.4.7 permite a atacantes remotos asistidos por el usuario provocar una denegación de servicio ( desreferenciar puntero NULO y bloqueo de la aplicación ) a través de un archivo de diccionario manipulado. • http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061290.html • CWE-476: NULL Pointer Dereference •

CVE-2011-1959 – wireshark: Stack-based buffer over-read from tvbuff buffer when reading snoop capture files
https://notcve.org/view.php?id=CVE-2011-1959
06 Jun 2011 — The snoop_read function in wiretap/snoop.c in Wireshark 1.2.x before 1.2.17 and 1.4.x before 1.4.7 does not properly handle certain virtualizable buffers, which allows remote attackers to cause a denial of service (application crash) via a large length value in a snoop file that triggers a stack-based buffer over-read. La función snoop_read en wiretap/snoop.c de Wireshark v1.2.x antes de v1.2.17 y v1.4.x antes de v1.4.7 no maneja adecuadamente ciertos búfers virtualizables, que permite a atacantes remotos p... • http://anonsvn.wireshark.org/viewvc?view=revision&revision=37068 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2011-2175 – wireshark: Heap-based buffer over-read in Visual Networks dissector
https://notcve.org/view.php?id=CVE-2011-2175
06 Jun 2011 — Integer underflow in the visual_read function in wiretap/visual.c in Wireshark 1.2.x before 1.2.17 and 1.4.x before 1.4.7 allows remote attackers to cause a denial of service (application crash) via a malformed Visual Networks file that triggers a heap-based buffer over-read. Desbordamiento de enteros en la función visual_read en wiretap/visual.c de Wireshark v1.2.x con anterioridad a v1.2.17 y v1.4.x con anterioridad a v1.4.7 permite a atacantes remotos provocar una denegación de servicio ( caída de la apl... • http://anonsvn.wireshark.org/viewvc?view=revision&revision=37128 • CWE-189: Numeric Errors •