Page 10 of 674 results (0.011 seconds)

CVSS: 6.5EPSS: 0%CPEs: 2EXPL: 0

Infinite loops in the BPv6, OpenFlow, and Kafka protocol dissectors in Wireshark 4.0.0 to 4.0.1 and 3.6.0 to 3.6.9 allows denial of service via packet injection or crafted capture file Los bucles infinitos en los disectores de protocolo BPv6, OpenFlow y Kafka en Wireshark 4.0.0 a 4.0.1 y 3.6.0 a 3.6.9 permiten la denegación de servicio mediante inyección de paquetes o archivo de captura manipulado • https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-4345.json https://lists.debian.org/debian-lts-announce/2023/02/msg00007.html https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RDZMWIKH3L5JQZC6GSVOJ3N5UXNQPJGQ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SGWIW6K64PKC375YAONYXKIVT2FDEDV3 https://www.wireshark.org/security/wnpa-sec-2022-09.html • CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') •

CVSS: 6.3EPSS: 0%CPEs: 2EXPL: 0

Memory exhaustion in the Kafka protocol dissector in Wireshark 4.0.0 to 4.0.1 and 3.6.0 to 3.6.9 allows denial of service via packet injection or crafted capture file El agotamiento de la memoria en el disector del protocolo Kafka en Wireshark 4.0.0 a 4.0.1 y 3.6.0 a 3.6.9 permite la denegación de servicio mediante inyección de paquetes o archivo de captura manipulado • https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-4344.json https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RDZMWIKH3L5JQZC6GSVOJ3N5UXNQPJGQ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SGWIW6K64PKC375YAONYXKIVT2FDEDV3 https://www.wireshark.org/security/wnpa-sec-2022-10.html • CWE-400: Uncontrolled Resource Consumption •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

Crash in the USB HID protocol dissector in Wireshark 3.6.0 to 3.6.8 allows denial of service via packet injection or crafted capture file on Windows La falla en el disector del protocolo USB HID en Wireshark 3.6.0 a 3.6.8 permite la Denegación de Servicio (DoS) mediante inyección de paquetes o archivo de captura diseñado en Windows • https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-3724.json https://gitlab.com/wireshark/wireshark/-/issues/18384 https://www.wireshark.org/security/wnpa-sec-2022-08.html • CWE-134: Use of Externally-Controlled Format String •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 1

Crash in the OPUS protocol dissector in Wireshark 3.6.0 to 3.6.8 allows denial of service via packet injection or crafted capture file La falla en el disector del protocolo OPUS en Wireshark versión 3.6.0 a la versión 3.6.8 permite la Denegación de Servicio mediante inyección de paquetes o archivo de captura manipulado • https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-3725.json https://gitlab.com/wireshark/wireshark/-/issues/18378 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OIEIFFZ27YKCTK5C2VT4OEQSHPQDBNSF https://security.gentoo.org/glsa/202309-02 https://www.wireshark.org/security/wnpa-sec-2022-07.html • CWE-787: Out-of-bounds Write •

CVSS: 6.3EPSS: 0%CPEs: 4EXPL: 2

Infinite loop in the F5 Ethernet Trailer protocol dissector in Wireshark 3.6.0 to 3.6.7 and 3.4.0 to 3.4.15 allows denial of service via packet injection or crafted capture file Un bucle infinito en el disector del protocolo F5 Ethernet Trailer en Wireshark versiones 3.6.0 a 3.6.7 y 3.4.0 a 3.4.15, permite la denegación de servicio por medio de la inyección de paquetes o un archivo de captura diseñado A vulnerability was found in Wireshark. This issue occurs due to an Infinite loop in the F5 Ethernet Trailer protocol dissector in Wireshark, leading to a denial of service via packet injection or crafted capture file. • https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-3190.json https://gitlab.com/wireshark/wireshark/-/issues/18307 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CH4NUKZKPY4MFQHFBTONJK2AWES4DFDA https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YR5LIOF5VKS4DC2NQWXTMPPXOYJC46XC https://www.wireshark.org/security/wnpa-sec-2022-06.html https://access.redhat.com/security/cve/CVE-2022-3190 https://bugzilla.redha • CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') •