Page 11 of 61 results (0.012 seconds)

CVSS: 5.0EPSS: 11%CPEs: 24EXPL: 0

Ethereal 0.10.1 to 0.10.2 allows remote attackers to cause a denial of service (crash) via a zero-length Presentation protocol selector. Ethereal 0.8.13 a 0.10.2 permite a atacantes remotos causar una denegación de servicio (caída) mediante un seleccionador de protocolo de Presentación de longitud cero. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000835 http://marc.info/?l=bugtraq&m=108058005324316&w=2 http://secunia.com/advisories/11185 http://security.gentoo.org/glsa/glsa-200403-07.xml http://www.ethereal.com/appnotes/enpa-sa-00013.html http://www.ethereal.com/lists/ethereal-dev/200404/msg00296.html http://www.kb.cert.org/vuls/id/792286 http://www.mandriva.com/security/advisories?name=MDKSA-2004:024 http://www.redhat.com/support/errata/RHSA-2004-13 •

CVSS: 5.0EPSS: 93%CPEs: 24EXPL: 2

Multiple buffer overflows in Ethereal 0.8.13 to 0.10.2 allow remote attackers to cause a denial of service and possibly execute arbitrary code via the (1) NetFlow, (2) IGAP, (3) EIGRP, (4) PGM, (5) IrDA, (6) BGP, (7) ISUP, or (8) TCAP dissectors. Múltiples desbordamientos de búfer en Ethereal 0.8.13 a 0.10.2 permite a atacantes remotos causar una denegación de servicio y posiblemente ejecutar código arbitrario mediante los diseccionadores (1) NetFlow, (2) IGAP, (3) EIGRP, (4) PGM, (5) IrDA, (6) BGP, (7) ISUP, o (8) TCAP. • https://www.exploit-db.com/exploits/167 https://www.exploit-db.com/exploits/170 http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000835 http://marc.info/?l=bugtraq&m=108007072215742&w=2 http://marc.info/?l=bugtraq&m=108058005324316&w=2 http://marc.info/?l=bugtraq&m=108213710306260&w=2 http://secunia.com/advisories/11185 http://security.e-matters.de/advisories/032004.html http://security.gentoo.org/glsa/glsa-200403-07.xml http://www.debian.org/secu •

CVSS: 5.0EPSS: 2%CPEs: 17EXPL: 0

The SMB dissector in Ethereal before 0.10.0 allows remote attackers to cause a denial of service via a malformed SMB packet that triggers a segmentation fault during processing of Selected packets. El diseccionador SMB en Ethereal 0.10.0 permite a atacantes remotos causar una denegación de servicio mediante un paquete SMB malformado que dispara un fallo de segmento durante el proceso de paquetes seleccionados. • ftp://patches.sgi.com/support/free/security/advisories/20040103-01-U.asc ftp://patches.sgi.com/support/free/security/advisories/20040202-01-U.asc http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000801 http://secunia.com/advisories/10531 http://secunia.com/advisories/10568 http://secunia.com/advisories/10570 http://www.debian.org/security/2004/dsa-407 http://www.ethereal.com/appnotes/enpa-sa-00012.html http://www.mandriva.com/security/advisories?name=MDKSA-2004:002 •

CVSS: 7.5EPSS: 16%CPEs: 1EXPL: 0

The Q.931 dissector in Ethereal before 0.10.0, and Tethereal, allows remote attackers to cause a denial of service (crash) via a malformed Q.931, which triggers a null dereference. El diseccionador Q.931 en Ethereal anteriores a 0.10.0 y Tethereal, permite a atacantes remotos causar una denegación de servicio (caída) mediante un Q.931 malformado, lo que dispara una desreferencia nula. • ftp://patches.sgi.com/support/free/security/advisories/20040103-01-U.asc ftp://patches.sgi.com/support/free/security/advisories/20040202-01-U.asc http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000801 http://secunia.com/advisories/10531 http://secunia.com/advisories/10568 http://secunia.com/advisories/10570 http://www.debian.org/security/2003/dsa-407 http://www.ethereal.com/appnotes/enpa-sa-00012.html http://www.mandriva.com/security/advisories?name=MDKSA-2004:002 • CWE-476: NULL Pointer Dereference •

CVSS: 5.0EPSS: 0%CPEs: 16EXPL: 0

Ethereal 0.9.15 and earlier, and Tethereal, allows remote attackers to cause a denial of service (crash) via certain malformed (1) ISAKMP or (2) MEGACO packets. Ethereal 0.9.15 y anteriores, y Tethereal permite a atacantes remotos causar una denegación de servicio (caída) mediante ciertos paquetes ISAKMP o MEGACO malformados. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000780 http://secunia.com/advisories/10531 http://www.debian.org/security/2003/dsa-407 http://www.ethereal.com/appnotes/enpa-sa-00011.html http://www.mandriva.com/security/advisories?name=MDKSA-2003:114 http://www.redhat.com/support/errata/RHSA-2003-323.html http://www.redhat.com/support/errata/RHSA-2003-324.html http://www.securityfocus.com/bid/8951 http://www.turbolinux.com/security/TLSA-2003-64.txt https: •