Page 15 of 127 results (0.008 seconds)

CVSS: 5.9EPSS: 0%CPEs: 16EXPL: 0

The USB subsystem in Wireshark 1.12.x before 1.12.12 and 2.x before 2.0.4 mishandles class types, which allows remote attackers to cause a denial of service (application crash) via a crafted packet. El subsistema de USB en Wireshark 1.12.x en versiones anteriores a 1.12.12 y 2.x en versiones anteriores a 2.0.4 no maneja correctamente tipos de clase, lo que permite a atacantes remotos provocar una denegación de servicio (caída de aplicación) a través de un paquete manipulado. • http://www.debian.org/security/2016/dsa-3615 http://www.openwall.com/lists/oss-security/2016/06/09/3 http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html http://www.securityfocus.com/bid/91140 https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12356 https://github.com/wireshark/wireshark/commit/2cb5985bf47bdc8bea78d28483ed224abdd33dc6 https://www.wireshark.org/security/wnpa-sec-2016-33.html • CWE-476: NULL Pointer Dereference •

CVSS: 5.9EPSS: 0%CPEs: 16EXPL: 0

epan/dissectors/packet-umts_fp.c in the UMTS FP dissector in Wireshark 1.12.x before 1.12.12 and 2.x before 2.0.4 mishandles the reserved C/T value, which allows remote attackers to cause a denial of service (application crash) via a crafted packet. epan/dissectors/packet-umts_fp.c en el disector UMTS FP en Wireshark 1.12.x en versiones anteriores a 1.12.12 y 2.x en versiones anteriores a 2.0.4 no maneja correctamente el valor reservado C/T, lo que permite a atacantes remotos provocar una denegación de servicio (caída de aplicación) a través de un paquete manipulado. • http://www.debian.org/security/2016/dsa-3615 http://www.openwall.com/lists/oss-security/2016/06/09/3 http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html http://www.securityfocus.com/bid/91140 https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12191 https://github.com/wireshark/wireshark/commit/7d7190695ce2ff269fdffb04e87139995cde21f4 https://www.wireshark.org/security/wnpa-sec-2016-32.html • CWE-20: Improper Input Validation •

CVSS: 7.5EPSS: 0%CPEs: 16EXPL: 0

epan/dissectors/packet-dcerpc-spoolss.c in the SPOOLS component in Wireshark 1.12.x before 1.12.12 and 2.x before 2.0.4 mishandles unexpected offsets, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet. epan/dissectors/packet-dcerpc-spoolss.c en el componente SPOOLS en Wireshark 1.12.x en versiones anteriores a 1.12.12 y 2.x en versiones anteriores a 2.0.4 no maneja correctamente offsets no esperados, lo que permite a atacantes remotos provocar una denegación de servicio (bucle infinito) a través de un paquete manipulado. • http://www.debian.org/security/2016/dsa-3615 http://www.openwall.com/lists/oss-security/2016/06/09/3 http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html http://www.securityfocus.com/bid/91140 https://github.com/wireshark/wireshark/commit/b4d16b4495b732888e12baf5b8a7e9bf2665e22b https://www.wireshark.org/security/wnpa-sec-2016-29.html • CWE-399: Resource Management Errors •

CVSS: 5.9EPSS: 0%CPEs: 17EXPL: 0

wiretap/netscreen.c in the NetScreen file parser in Wireshark 1.12.x before 1.12.12 and 2.x before 2.0.4 mishandles sscanf unsigned-integer processing, which allows remote attackers to cause a denial of service (application crash) via a crafted file. wiretap/netscreen.c en el analizador de archivo NetScreen en Wireshark 1.12.x en versiones anteriores a 1.12.12 y 2.x en versiones anteriores a 2.0.4 no maneja correctamente procesamiento sin signo de entero sscanf, lo que permite a atacantes remotos provocar una denegación de servicio (caída de aplicación) a través de un archivo manipulado. • http://www.debian.org/security/2016/dsa-3615 http://www.openwall.com/lists/oss-security/2016/06/09/3 http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html http://www.securityfocus.com/bid/91140 https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12396 https://github.com/wireshark/wireshark/commit/11edc83b98a61e890d7bb01855389d40e984ea82 https://github.com/wireshark/wireshark/commit/6a140eca7b78b230f1f90a739a32257476513c78 https://www.wireshark.org/security/wnpa-sec-2016-36.html • CWE-20: Improper Input Validation •

CVSS: 5.9EPSS: 0%CPEs: 12EXPL: 0

Off-by-one error in epan/dissectors/packet-gsm_abis_oml.c in the GSM A-bis OML dissector in Wireshark 1.12.x before 1.12.10 and 2.x before 2.0.2 allows remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted packet that triggers a 0xff tag value. Error por un paso en epan/dissectors/packet-gsm_abis_oml.c en el disector GSM A-bis OML en Wireshark 1.12.x en versiones anteriores a 1.12.10 y 2.x en versiones anteriores a 2.0.2 permite a atacantes remotos provocar una denegación de servicio (sobrelectura de buffer y caída de aplicación) a través de un paquete manipulado que desencadena un valor de etiqueta 0xff. • http://lists.opensuse.org/opensuse-updates/2016-03/msg00015.html http://lists.opensuse.org/opensuse-updates/2016-03/msg00016.html http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11825 https://www.wireshark.org/security/wnpa-sec-2016-14.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •