Page 14 of 122 results (0.007 seconds)

CVSS: 7.5EPSS: 0%CPEs: 16EXPL: 0

In Wireshark 2.4.0 to 2.4.2 and 2.2.0 to 2.2.10, the NetBIOS dissector could crash. This was addressed in epan/dissectors/packet-netbios.c by ensuring that write operations are bounded by the beginning of a buffer. En Wireshark 2.4.0 a 2.4.2 y 2.2.0 a 2.2.10, el disector NetBIOS podía cerrarse inesperadamente. Esto se solucionó en epan/dissectors/packet-netbios.c asegurando que las operaciones de escritura estaban limitadas al principio de un búfer. • http://www.securityfocus.com/bid/102029 https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14249 https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=79768d63d14fbce6bf7fb4d4a1c86be0c5205eb3 https://lists.debian.org/debian-lts-announce/2017/12/msg00029.html https://www.debian.org/security/2017/dsa-4060 https://www.wireshark.org/security/wnpa-sec-2017-48.html • CWE-754: Improper Check for Unusual or Exceptional Conditions •

CVSS: 7.5EPSS: 0%CPEs: 16EXPL: 0

In Wireshark 2.4.0 to 2.4.2 and 2.2.0 to 2.2.10, the IWARP_MPA dissector could crash. This was addressed in epan/dissectors/packet-iwarp-mpa.c by validating a ULPDU length. En Wireshark 2.4.0 a 2.4.2 y 2.2.0 a 2.2.10, el disector IWARP_MPA podía cerrarse inesperadamente. Esto se trató en epan/dissectors/packet-iwarp-mpa.c validando la longitud de una ULPDU. • http://www.securityfocus.com/bid/102030 https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14236 https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=8502fe94ef9e431860921507e1a351c5e3f5c634 https://lists.debian.org/debian-lts-announce/2017/12/msg00029.html https://www.debian.org/security/2017/dsa-4060 https://www.wireshark.org/security/wnpa-sec-2017-47.html • CWE-754: Improper Check for Unusual or Exceptional Conditions •

CVSS: 7.5EPSS: 0%CPEs: 16EXPL: 1

In Wireshark 2.4.0 to 2.4.2 and 2.2.0 to 2.2.10, the CIP Safety dissector could crash. This was addressed in epan/dissectors/packet-cipsafety.c by validating the packet length. En Wireshark 2.4.0 a 2.4.2 y 2.2.0 a 2.2.10, el disector CIP Safety podía cerrarse inesperadamente. Esto se trató en epan/dissectors/packet-cipsafety.c validando la longitud del paquete. Wireshark versions 2.4.0 through 2.4.2 and 2.2.0 through 2.2.10 suffer from a crash issue in the CIP Safety dissector. • https://www.exploit-db.com/exploits/43233 http://www.securityfocus.com/bid/102071 https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14250 https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=f5939debe96e3c3953c6020818f1fbb80eb83ce8 https://lists.debian.org/debian-lts-announce/2017/12/msg00029.html https://www.debian.org/security/2017/dsa-4060 https://www.wireshark.org/security/wnpa-sec-2017-49.html • CWE-754: Improper Check for Unusual or Exceptional Conditions •

CVSS: 7.5EPSS: 0%CPEs: 4EXPL: 0

In Wireshark 2.4.0 to 2.4.1, 2.2.0 to 2.2.9, and 2.0.0 to 2.0.15, the DMP dissector could crash. This was addressed in epan/dissectors/packet-dmp.c by validating a string length. En Wireshark, desde la versión 2.4.0 hasta la 2.4.1, desde la 2.2.0 hasta la 2.2.9 y desde la 2.0.0 hasta la 2.0.15, el disector DMP podría cerrarse de manera inesperada. Esto se trató en epan/dissectors/packet-dmp.c validando la longitud de un string. • http://www.securityfocus.com/bid/101227 https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14068 https://code.wireshark.org/review/23591 https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=8dbb21dfde14221dab09b6b9c7719b9067c1f06e https://lists.debian.org/debian-lts-announce/2019/01/msg00010.html https://www.wireshark.org/security/wnpa-sec-2017-44.html • CWE-134: Use of Externally-Controlled Format String •

CVSS: 7.8EPSS: 0%CPEs: 12EXPL: 0

In Wireshark 2.4.0 to 2.4.1 and 2.2.0 to 2.2.9, the MBIM dissector could crash or exhaust system memory. This was addressed in epan/dissectors/packet-mbim.c by changing the memory-allocation approach. En Wireshark desde la versión 2.4.0 hasta la 2.4.1 y desde la 2.2.0 hasta la 2.2.9, el disector MBIM podría cerrarse inesperadamente o agotar la memoria del sistema. Esto se abordó en epan/dissectors/packet-mbim.c cambiando el enfoque de asignación de memoria. • http://www.securityfocus.com/bid/101240 https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14056 https://code.wireshark.org/review/23537 https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=afb9ff7982971aba6e42472de0db4c1bedfc641b https://www.wireshark.org/security/wnpa-sec-2017-43.html • CWE-400: Uncontrolled Resource Consumption •