Page 131 of 672 results (0.008 seconds)

CVSS: 7.8EPSS: 1%CPEs: 1EXPL: 0

Wireshark 0.99.5 allows remote attackers to cause a denial of service (memory consumption) via a malformed DCP ETSI packet that triggers an infinite loop. Wireshark 0.99.5 permite a atacantes remotos provocar una denegación de servicio (consumo de memoria) con un paquete DCP ETSI mal formado que provoca un bucle infinito. • http://osvdb.org/37641 http://secunia.com/advisories/25833 http://secunia.com/advisories/25987 http://secunia.com/advisories/26004 http://secunia.com/advisories/26499 http://secunia.com/advisories/28583 http://security.gentoo.org/glsa/glsa-200708-12.xml http://www.mandriva.com/security/advisories?name=MDKSA-2007:145 http://www.novell.com/linux/security/advisories/2007_15_sr.html http://www.redhat.com/support/errata/RHSA-2007-0709.html http://www.redhat.com/support/e • CWE-20: Improper Input Validation •

CVSS: 5.0EPSS: 2%CPEs: 1EXPL: 0

Wireshark before 0.99.6 allows remote attackers to cause a denial of service via malformed (1) SSL or (2) MMS packets that trigger an infinite loop. Wireshark anterior a 0.99.6 permite a atacantes remotos provocar una denegación de servicio mediante paquetes (1) SSL o (2) MMS que provocan un bucle infinito. • http://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1582 http://secunia.com/advisories/25833 http://secunia.com/advisories/25877 http://secunia.com/advisories/25987 http://secunia.com/advisories/26004 http://secunia.com/advisories/26499 http://secunia.com/advisories/28583 http://security.gentoo.org/glsa/glsa-200708-12.xml http://www.debian.org/security/2007/dsa-1322 http://www.mandriva.com/security/advisories?name=MDKSA-2007:145 http://www.novell.com/linux/security/advis •

CVSS: 5.0EPSS: 2%CPEs: 6EXPL: 0

Wireshark before 0.99.6 allows remote attackers to cause a denial of service (crash) via a crafted chunked encoding in an HTTP response, possibly related to a zero-length payload. Wireshark anterior a 0.99.6 permite a atacantes remotos provocar una denegación de servicio (caída) mediante una codificación manual por trozos (crafted chunked encoding) en una respuesta HTTP, posiblemente relacionado con un segmento de datos (payload) de longitud cero. • http://osvdb.org/37643 http://secunia.com/advisories/25833 http://secunia.com/advisories/25987 http://secunia.com/advisories/26004 http://secunia.com/advisories/26499 http://secunia.com/advisories/27592 http://secunia.com/advisories/28583 http://security.gentoo.org/glsa/glsa-200708-12.xml http://www.mandriva.com/security/advisories?name=MDKSA-2007:145 http://www.novell.com/linux/security/advisories/2007_15_sr.html http://www.redhat.com/support/errata/RHSA-2007-0709.html • CWE-20: Improper Input Validation •

CVSS: 5.0EPSS: 2%CPEs: 1EXPL: 0

Off-by-one error in the DHCP/BOOTP dissector in Wireshark before 0.99.6 allows remote attackers to cause a denial of service (crash) via crafted DHCP-over-DOCSIS packets. Error de superación de límite (off-by-one) en el disector DHCP/BOOTP de Wireshark anterior a 0.99.6 permite a atacantes remotos provocar una denegación de servicio (caída) mediante paquetes DHCP-over-DOCSIS manipulados de forma artesanal. • http://osvdb.org/37639 http://secunia.com/advisories/22588 http://secunia.com/advisories/25833 http://secunia.com/advisories/25877 http://secunia.com/advisories/25987 http://secunia.com/advisories/26004 http://secunia.com/advisories/26499 http://secunia.com/advisories/28583 http://security.gentoo.org/glsa/glsa-200708-12.xml http://www.debian.org/security/2007/dsa-1322 http://www.mandriva.com/security/advisories?name=MDKSA-2007:145 http://www.novell.com/linux/security& •

CVSS: 5.0EPSS: 3%CPEs: 3EXPL: 1

packet-tcp.c in the TCP dissector in Wireshark (formerly Ethereal) 0.99.2 through 0.99.4 allows remote attackers to cause a denial of service (application crash or hang) via fragmented HTTP packets. packet-tcp.c en el disector TCP en Wireshark (formalmente Ethereal) 0.99.2 hasta 0.99.4 permite a atacantes remotos provocar denegación de servicio (caida de aplicación o culegue) a través de paquetes HTTP fragmentados. • ftp://patches.sgi.com/support/free/security/advisories/20070301-01-P.asc http://bugs.wireshark.org/bugzilla/show_bug.cgi?id=1200 http://fedoranews.org/cms/node/2565 http://secunia.com/advisories/24011 http://secunia.com/advisories/24016 http://secunia.com/advisories/24025 http://secunia.com/advisories/24084 http://secunia.com/advisories/24515 http://secunia.com/advisories/24650 http://secunia.com/advisories/24970 http://securitytracker.com/id?1017581 http://support.avaya •