Page 11 of 54 results (0.010 seconds)

CVSS: 4.3EPSS: 1%CPEs: 7EXPL: 2

The "decode as" feature in packet-bssap.c in the SCCP dissector in Wireshark (formerly Ethereal) 0.99.6 through 0.99.8 allows remote attackers to cause a denial of service (application crash) via a malformed packet. La característica "decode as" (descodificar como) en packet-bssap.c del analizador SCCP en Wireshark (anteriormente Ethereal) de 0.99.6 a 0.99.8 permite a atacantes remotos provocar una denegación de servicio (caída de aplicación) a través de un paquete mal formado. • https://www.exploit-db.com/exploits/31554 http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00005.html http://secunia.com/advisories/29569 http://secunia.com/advisories/29622 http://secunia.com/advisories/29695 http://secunia.com/advisories/29736 http://secunia.com/advisories/29971 http://secunia.com/advisories/32091 http://support.avaya.com/elmodocs2/security/ASA-2008-392.htm http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0138 http://www.gentoo.org/security/ •

CVSS: 5.0EPSS: 0%CPEs: 15EXPL: 0

The SCTP dissector in Wireshark (formerly Ethereal) 0.99.5 through 0.99.7 allows remote attackers to cause a denial of service (crash) via a malformed packet. El analizador SCTP de Wireshark (anteriormente Ethereal) de 0.99.5 a 0.99.7 permite a atacantes remotos provocar una denegación de servicio (caída) a través de un paquete mal formado. • http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00001.html http://secunia.com/advisories/29156 http://secunia.com/advisories/29188 http://secunia.com/advisories/29223 http://secunia.com/advisories/29242 http://secunia.com/advisories/29511 http://secunia.com/advisories/29736 http://secunia.com/advisories/32091 http://security.gentoo.org/glsa/glsa-200803-32.xml http://support.avaya.com/elmodocs2/security/ASA-2008-392.htm http://wiki.rpath.com/wiki/Advisories:rPSA& •

CVSS: 4.3EPSS: 0%CPEs: 15EXPL: 0

The SNMP dissector in Wireshark (formerly Ethereal) 0.99.6 through 0.99.7 allows remote attackers to cause a denial of service (crash) via a malformed packet. El analizador SNMP de Wireshark (anteriormente Ethereal) 0.99.6 hasta 0.99.7, permite a atacantes remotos provocar una denegación de servicio (caída) a través de un paquete mal formado. • http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00001.html http://secunia.com/advisories/29156 http://secunia.com/advisories/29188 http://secunia.com/advisories/29223 http://secunia.com/advisories/29242 http://secunia.com/advisories/29511 http://secunia.com/advisories/29736 http://secunia.com/advisories/32091 http://security.gentoo.org/glsa/glsa-200803-32.xml http://support.avaya.com/elmodocs2/security/ASA-2008-392.htm http://wiki.rpath.com/wiki/Advisories:rPSA& • CWE-399: Resource Management Errors •

CVSS: 4.7EPSS: 0%CPEs: 15EXPL: 0

The TFTP dissector in Wireshark (formerly Ethereal) 0.6.0 through 0.99.7, when running on Ubuntu 7.10, allows remote attackers to cause a denial of service (crash or memory consumption) via a malformed packet, possibly related to a Cairo library bug. El TFTP dissector en Wireshark (antes Ethereal) de la v.0.6.0 a la v.0.99.7 ejecutado sobre Ubuntu 7.10, permite a atacantes remotos causar una denegación de servicio (caída o consumo de memoria) a través de un paquete defectuoso, posiblemente en relación al bug de la biblioteca Cairo. • http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00001.html http://secunia.com/advisories/29156 http://secunia.com/advisories/29188 http://secunia.com/advisories/29223 http://secunia.com/advisories/29242 http://secunia.com/advisories/29511 http://secunia.com/advisories/29736 http://secunia.com/advisories/32091 http://security.gentoo.org/glsa/glsa-200803-32.xml http://support.avaya.com/elmodocs2/security/ASA-2008-392.htm http://wiki.rpath.com/wiki/Advisories:rPSA& •