Page 10 of 51 results (0.008 seconds)

CVSS: 5.0EPSS: 1%CPEs: 10EXPL: 0

Unspecified vulnerability in the WBXML dissector in Wireshark (formerly Ethereal) 0.10.11 through 0.99.3 allows remote attackers to cause a denial of service (crash) via certain vectors that trigger a null dereference. Vulnerabilidad sin especificar en el diseccionador WBXML (antiguamente Ethereal)desde la versión 0.10.11 hasta la 0.99.3., permite a atacantes remotos causar la denegación de servicio (caída) mediante determinados vectores que disparen referencias nulas. • ftp://patches.sgi.com/support/free/security/advisories/20061101-01-P http://secunia.com/advisories/22590 http://secunia.com/advisories/22672 http://secunia.com/advisories/22692 http://secunia.com/advisories/22797 http://secunia.com/advisories/22841 http://secunia.com/advisories/22929 http://secunia.com/advisories/23096 http://securitytracker.com/id?1017129 http://support.avaya.com/elmodocs2/security/ASA-2006-255.htm http://www.mandriva.com/security/advisories?name=MDKSA-2006:195&# •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

Off-by-one error in the MIME Multipart dissector in Wireshark (formerly Ethereal) 0.10.1 through 0.99.3 allows remote attackers to cause a denial of service (crash) via certain vectors that trigger an assertion error related to unexpected length values. Error por un paso en el disector MIME Multipart en Wireshark (anteriormente Ethereal) desde la versión 0.10.1 hasta la 0.99.3 permite que atacantes remotos provoquen una denegación de servicio (cierre inesperado) mediante determinados vectores que desencadenan un error de aserción relacionado con valores de longitud inesperados. • ftp://patches.sgi.com/support/free/security/advisories/20061101-01-P http://secunia.com/advisories/22590 http://secunia.com/advisories/22659 http://secunia.com/advisories/22672 http://secunia.com/advisories/22692 http://secunia.com/advisories/22797 http://secunia.com/advisories/22841 http://secunia.com/advisories/22929 http://secunia.com/advisories/23096 http://securitytracker.com/id?1017129 http://support.avaya.com/elmodocs2/security/ASA-2006-255.htm http://www.mandriva.com • CWE-193: Off-by-one Error CWE-617: Reachable Assertion •

CVSS: 5.0EPSS: 2%CPEs: 9EXPL: 0

epan/dissectors/packet-xot.c in the XOT dissector (dissect_xot_pdu) in Wireshark (formerly Ethereal) 0.9.8 through 0.99.3 allows remote attackers to cause a denial of service (memory consumption and crash) via an encoded XOT packet that produces a zero length value when it is decoded. epan/dissectors/packet-xot.c en el separador XOT (dissect_xot_pdu) en Wireshark (antes conocido como Ethereal) 0.9.8 hasta la 0.99.3 permite a un atacante remoto provocar denegación de servicio (consumo de memoria y caida) a través de un paquete XOT codificado que crea un valor de longitud zero cuando está codificado. • ftp://patches.sgi.com/support/free/security/advisories/20061101-01-P http://secunia.com/advisories/22590 http://secunia.com/advisories/22659 http://secunia.com/advisories/22672 http://secunia.com/advisories/22692 http://secunia.com/advisories/22797 http://secunia.com/advisories/22841 http://secunia.com/advisories/22929 http://secunia.com/advisories/23096 http://securitytracker.com/id?1017129 http://support.avaya.com/elmodocs2/security/ASA-2006-255.htm http://www.kb.cert. •

CVSS: 10.0EPSS: 2%CPEs: 23EXPL: 0

Multiple format string vulnerabilities in Wireshark (aka Ethereal) 0.10.x to 0.99.0 allow remote attackers to cause a denial of service and possibly execute arbitrary code via the (1) ANSI MAP, (2) Checkpoint FW-1, (3) MQ, (4) XML, and (5) NTP dissectors. Múltiples vulnerabilidades de formato de cadena en Wireshark (atmbién conocido como Ethereal) 0.10.x a 0.99.0 permite a atacantes remotos provocar denegación de servicio y posiblemente ejecutar código de su eleccción a través de los disectores (1) ANSI MAP, (2) Checkpoint FW-1, (3) MQ, (4) XML, y (5) NTP. • ftp://patches.sgi.com/support/free/security/advisories/20060801-01-P http://rhn.redhat.com/errata/RHSA-2006-0602.html http://secunia.com/advisories/21078 http://secunia.com/advisories/21107 http://secunia.com/advisories/21121 http://secunia.com/advisories/21204 http://secunia.com/advisories/21249 http://secunia.com/advisories/21467 http://secunia.com/advisories/21488 http://secunia.com/advisories/21598 http://secunia.com/advisories/22089 http://security.gentoo.org/glsa/ • CWE-134: Use of Externally-Controlled Format String •

CVSS: 7.5EPSS: 1%CPEs: 3EXPL: 0

Multiple off-by-one errors in Wireshark (aka Ethereal) 0.9.7 to 0.99.0 have unknown impact and remote attack vectors via the (1) NCP NMAS and (2) NDPS dissectors. Múltiples errores de superación de límite (off-by-one) en Wireshark (también conocido como Ethereal) 0.9.7 hasta 0.99.0 tienen impacto y vectores de ataque remotos desconocidos a través de los analizadores (1) NCP NMAS y (2) NDPS. • ftp://patches.sgi.com/support/free/security/advisories/20060801-01-P http://rhn.redhat.com/errata/RHSA-2006-0602.html http://secunia.com/advisories/21078 http://secunia.com/advisories/21107 http://secunia.com/advisories/21121 http://secunia.com/advisories/21204 http://secunia.com/advisories/21249 http://secunia.com/advisories/21467 http://secunia.com/advisories/21488 http://secunia.com/advisories/21598 http://secunia.com/advisories/22089 http://security.gentoo.org/glsa/ • CWE-189: Numeric Errors •