Page 16 of 105 results (0.008 seconds)

CVSS: 5.0EPSS: 1%CPEs: 5EXPL: 0

The SPNEGO dissector in Ethereal 0.9.8 to 0.10.3 allows remote attackers to cause a denial of service (crash) via unknown attack vectors that cause a null pointer dereference. El diseccionador de SPNEGO en Ethereal 0.9.8 a 0.10.3 permite a atacantes remotos causar una denegación de servicio (caída) mediante vectores de ataque desconocidos que causan una desreferencia de puntero nulo. • ftp://patches.sgi.com/support/free/security/advisories/20040604-01-U.asc ftp://patches.sgi.com/support/free/security/advisories/20040605-01-U.asc http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000916 http://secunia.com/advisories/11608 http://secunia.com/advisories/11776 http://secunia.com/advisories/11836 http://security.gentoo.org/glsa/glsa-200406-01.xml http://securitytracker.com/id?1010158 http://www.ciac.org/ciac/bulletins/o-150.shtml http://www.ethereal&# •

CVSS: 5.0EPSS: 1%CPEs: 5EXPL: 0

Ethereal 0.10.3 allows remote attackers to cause a denial of service (crash) via certain SIP messages between Hotsip servers and clients. Ethereal 0.10.3 permite a atacantes remotos causar una denegación de servicio (caída) mediante ciertos mensajes SIP entre servidores y clientes Hostip. • ftp://patches.sgi.com/support/free/security/advisories/20040604-01-U.asc ftp://patches.sgi.com/support/free/security/advisories/20040605-01-U.asc http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000916 http://secunia.com/advisories/11608 http://secunia.com/advisories/11776 http://secunia.com/advisories/11836 http://security.gentoo.org/glsa/glsa-200406-01.xml http://securitytracker.com/id?1010158 http://www.ciac.org/ciac/bulletins/o-150.shtml http://www.ethereal&# •

CVSS: 10.0EPSS: 3%CPEs: 5EXPL: 0

Buffer overflow in the MMSE dissector for Ethereal 0.10.1 to 0.10.3 allows remote attackers to cause a denial of service and possibly execute arbitrary code. Desbordamiento de búfer en el diseccionador de MSSE de Ethereal 1.10.1 a 0.10.3 permite a atacantes remotos causar una denegación de servicio y posiblemente ejecutar código de su elección. • ftp://patches.sgi.com/support/free/security/advisories/20040604-01-U.asc ftp://patches.sgi.com/support/free/security/advisories/20040605-01-U.asc http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000916 http://rhn.redhat.com/errata/RHSA-2004-234.html http://secunia.com/advisories/11608 http://secunia.com/advisories/11776 http://secunia.com/advisories/11836 http://security.gentoo.org/glsa/glsa-200406-01.xml http://securitytracker.com/id?1010158 http://www.ciac.o •

CVSS: 5.0EPSS: 1%CPEs: 5EXPL: 0

The AIM dissector in Ethereal 0.10.3 allows remote attackers to cause a denial of service (assert error) via unknown attack vectors. El diseccionador AIM en Ethereal 0.10.3 permite a atacantes remotos causar una denegación de servicio (fallo en aserción) mediante vectores de ataque desconocidos. • ftp://patches.sgi.com/support/free/security/advisories/20040604-01-U.asc ftp://patches.sgi.com/support/free/security/advisories/20040605-01-U.asc http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000916 http://secunia.com/advisories/11608 http://secunia.com/advisories/11776 http://secunia.com/advisories/11836 http://security.gentoo.org/glsa/glsa-200406-01.xml http://securitytracker.com/id?1010158 http://www.ciac.org/ciac/bulletins/o-150.shtml http://www.ethereal&# •

CVSS: 5.0EPSS: 11%CPEs: 24EXPL: 0

Ethereal 0.10.1 to 0.10.2 allows remote attackers to cause a denial of service (crash) via a zero-length Presentation protocol selector. Ethereal 0.8.13 a 0.10.2 permite a atacantes remotos causar una denegación de servicio (caída) mediante un seleccionador de protocolo de Presentación de longitud cero. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000835 http://marc.info/?l=bugtraq&m=108058005324316&w=2 http://secunia.com/advisories/11185 http://security.gentoo.org/glsa/glsa-200403-07.xml http://www.ethereal.com/appnotes/enpa-sa-00013.html http://www.ethereal.com/lists/ethereal-dev/200404/msg00296.html http://www.kb.cert.org/vuls/id/792286 http://www.mandriva.com/security/advisories?name=MDKSA-2004:024 http://www.redhat.com/support/errata/RHSA-2004-13 •