CVE-2012-2394 – Wireshark - Misaligned Memory Denial of Service
https://notcve.org/view.php?id=CVE-2012-2394
Wireshark 1.4.x before 1.4.13 and 1.6.x before 1.6.8 on the SPARC and Itanium platforms does not properly perform data alignment for a certain structure member, which allows remote attackers to cause a denial of service (application crash) via a (1) ICMP or (2) ICMPv6 Echo Request packet. Wireshark 1.4.x anteriores a 1.4.13 y 1.6.x anteriores a 1.6.8 en plataformas SPARC e Itanium no realizan adecuadamente la alineación en memoria de miembros de estructuras determinados, lo que permite a atacantes remotos provocar una denegación de servicio (caída de la aplicación) a través de un paquete de petición Echo (1) ICMP o (2) ICMPv6. Wireshark versions 1.6.0 through 1.6.7 and versions 1.4.0 through 1.4.12 suffer from a misaligned memory denial of service vulnerability. • https://www.exploit-db.com/exploits/18920 http://anonsvn.wireshark.org/viewvc?view=revision&revision=42393 http://secunia.com/advisories/49226 http://www.mandriva.com/security/advisories?name=MDVSA-2012:015 http://www.mandriva.com/security/advisories?name=MDVSA-2012:042 http://www.mandriva.com/security/advisories?name=MDVSA-2012:080 http://www.securityfocus.com/bid/53653 http://www.securitytracker.com/id? • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2012-1595 – wireshark: Heap-based buffer overflow when reading ERF packets from pcap/pcap-ng trace files
https://notcve.org/view.php?id=CVE-2012-1595
The pcap_process_pseudo_header function in wiretap/pcap-common.c in Wireshark 1.4.x before 1.4.12 and 1.6.x before 1.6.6 allows remote attackers to cause a denial of service (application crash) via a WTAP_ENCAP_ERF file containing an Extension or Multi-Channel header with an invalid pseudoheader size, related to the pcap and pcap-ng file parsers. La función pcap_process_pseudo_header en wiretap/pcap-common.c en Wireshark v1.4.x antes de v1.4.12 y v1.6.x antes de v1.6.6 permite a atacantes remotos causar una denegación de servicio (caída de la aplicación) a través de un archivo WTAP_ENCAP_ERF que contiene una extensión o o cabecera multicanal con un tamaño de pseudo cabecera no válido. Se trata de un problema relacionado con los anaalizadores de tráfico (parsers) pcap y pcap-ng. • http://anonsvn.wireshark.org/viewvc?view=revision&revision=41008 http://lists.fedoraproject.org/pipermail/package-announce/2012-April/078769.html http://lists.fedoraproject.org/pipermail/package-announce/2012-April/078770.html http://lists.opensuse.org/opensuse-updates/2012-04/msg00060.html http://secunia.com/advisories/48548 http://secunia.com/advisories/48947 http://secunia.com/advisories/48986 http://www.openwall.com/lists/oss-security/2012/03/28/13 http://www.securityfocus.com/bid/52737& • CWE-122: Heap-based Buffer Overflow CWE-399: Resource Management Errors •
CVE-2012-1594
https://notcve.org/view.php?id=CVE-2012-1594
epan/dissectors/packet-ieee80211.c in the IEEE 802.11 dissector in Wireshark 1.6.x before 1.6.6 allows remote attackers to cause a denial of service (infinite loop) via a crafted packet. epan/dissectors/packet-ieee80211.c del analizador ("dissector") IEEE 802.11 de Wireshark 1.6.x anteriores a 1.6.6 permite a atacantes remotos provocar una denegación de servicio (bucle infinito) a través de un paquete modificado. • http://anonsvn.wireshark.org/viewvc?view=revision&revision=40967 http://lists.fedoraproject.org/pipermail/package-announce/2012-April/078770.html http://secunia.com/advisories/48548 http://www.openwall.com/lists/oss-security/2012/03/28/13 http://www.securityfocus.com/bid/52738 http://www.securitytracker.com/id?1026874 http://www.wireshark.org/security/wnpa-sec-2012-05.html https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6809 https://exchange.xforce.ibmcloud.com/vulnerabilities/74362& • CWE-94: Improper Control of Generation of Code ('Code Injection') •
CVE-2012-1596
https://notcve.org/view.php?id=CVE-2012-1596
The mp2t_process_fragmented_payload function in epan/dissectors/packet-mp2t.c in the MP2T dissector in Wireshark 1.4.x before 1.4.12 and 1.6.x before 1.6.6 allows remote attackers to cause a denial of service (application crash) via a packet containing an invalid pointer value that triggers an incorrect memory-allocation attempt. La función mp2t_process_fragmented_payload en epan/dissectors/packet-mp2t.c en MP2T en Wireshark v1.4.x anteriore a v1.4.12 y v1.6.x anterior a v1.6.6 permite a atacantes remotos provocar una denegación de servicio (caída de la aplicación) a través de un paquete que contenga un calor de puntero inválido que provoca un intento de posicionamiento de memoria incorrecto. • http://anonsvn.wireshark.org/viewvc?view=revision&revision=41001 http://lists.fedoraproject.org/pipermail/package-announce/2012-April/078769.html http://lists.fedoraproject.org/pipermail/package-announce/2012-April/078770.html http://lists.opensuse.org/opensuse-updates/2012-04/msg00060.html http://secunia.com/advisories/48548 http://secunia.com/advisories/48986 http://www.openwall.com/lists/oss-security/2012/03/28/13 http://www.securityfocus.com/bid/52736 http://www.securitytracker.com/id? • CWE-399: Resource Management Errors •
CVE-2012-0068
https://notcve.org/view.php?id=CVE-2012-0068
The lanalyzer_read function in wiretap/lanalyzer.c in Wireshark 1.4.x before 1.4.11 and 1.6.x before 1.6.5 allows remote attackers to cause a denial of service (application crash) via a Novell capture file containing a record that is too small. La función lanalyzer_read en wiretap/lanalyzer.c en versiones de Wireshark 1.4.x, anteriores a la 1.4.11 y versiones 1.6.x, anteriores a la 1.6.5 permite que atacantes remotos provoquen una denegación de servicio (cierre inesperado de la aplicación) a través de un fichero de captura Novell, que contiene un registro que es muy pequeño. • http://anonsvn.wireshark.org/viewvc?view=revision&revision=40169 http://secunia.com/advisories/47494 http://secunia.com/advisories/54425 http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml http://www.openwall.com/lists/oss-security/2012/01/11/7 http://www.openwall.com/lists/oss-security/2012/01/20/4 http://www.wireshark.org/security/wnpa-sec-2012-01.html https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6670 https://oval.cisecurity.org/repository/search/defi • CWE-20: Improper Input Validation •