Page 2 of 62 results (0.011 seconds)

CVSS: 10.0EPSS: 3%CPEs: 41EXPL: 0

Buffer overflow in Wireshark (aka Ethereal) 0.8.16 to 0.99.0 allows remote attackers to cause a denial of service and possibly execute arbitrary code via the NFS dissector. Desbordamiento de búfer en Wireshark (también conocido como Ethereal) 0.8.16 hasta 0.99.0 permite a atacantes remotos provocar una denegación de servicio y posiblemente ejecutar código de su elección a través del analizador de protocolo NFS. • ftp://patches.sgi.com/support/free/security/advisories/20060801-01-P http://rhn.redhat.com/errata/RHSA-2006-0602.html http://secunia.com/advisories/21078 http://secunia.com/advisories/21107 http://secunia.com/advisories/21121 http://secunia.com/advisories/21204 http://secunia.com/advisories/21249 http://secunia.com/advisories/21467 http://secunia.com/advisories/21488 http://secunia.com/advisories/21598 http://secunia.com/advisories/22089 http://security.gentoo.org/glsa/ • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 10.0EPSS: 2%CPEs: 23EXPL: 0

Multiple format string vulnerabilities in Wireshark (aka Ethereal) 0.10.x to 0.99.0 allow remote attackers to cause a denial of service and possibly execute arbitrary code via the (1) ANSI MAP, (2) Checkpoint FW-1, (3) MQ, (4) XML, and (5) NTP dissectors. Múltiples vulnerabilidades de formato de cadena en Wireshark (atmbién conocido como Ethereal) 0.10.x a 0.99.0 permite a atacantes remotos provocar denegación de servicio y posiblemente ejecutar código de su eleccción a través de los disectores (1) ANSI MAP, (2) Checkpoint FW-1, (3) MQ, (4) XML, y (5) NTP. • ftp://patches.sgi.com/support/free/security/advisories/20060801-01-P http://rhn.redhat.com/errata/RHSA-2006-0602.html http://secunia.com/advisories/21078 http://secunia.com/advisories/21107 http://secunia.com/advisories/21121 http://secunia.com/advisories/21204 http://secunia.com/advisories/21249 http://secunia.com/advisories/21467 http://secunia.com/advisories/21488 http://secunia.com/advisories/21598 http://secunia.com/advisories/22089 http://security.gentoo.org/glsa/ • CWE-134: Use of Externally-Controlled Format String •

CVSS: 7.8EPSS: 1%CPEs: 31EXPL: 0

Unspecified vulnerability in the MOUNT dissector in Wireshark (aka Ethereal) 0.9.4 to 0.99.0 allows remote attackers to cause a denial of service (memory consumption) via unspecified vectors. Vulnerabilidad no especificada en el disector MOUNT en Wireshark (también conocido como Ethereal) 0.9.4 a 0.99.0 permite a atacantes remotos provocar denegación de servicio (consumo de memoria) a través de vectores no especificados. • ftp://patches.sgi.com/support/free/security/advisories/20060801-01-P http://rhn.redhat.com/errata/RHSA-2006-0602.html http://secunia.com/advisories/21078 http://secunia.com/advisories/21107 http://secunia.com/advisories/21121 http://secunia.com/advisories/21204 http://secunia.com/advisories/21249 http://secunia.com/advisories/21467 http://secunia.com/advisories/21488 http://secunia.com/advisories/21598 http://secunia.com/advisories/22089 http://security.gentoo.org/glsa/ •

CVSS: 5.0EPSS: 2%CPEs: 18EXPL: 0

Buffer overflow in Ethereal 0.8.5 up to 0.10.14 allows remote attackers to execute arbitrary code via the telnet dissector. • ftp://patches.sgi.com/support/free/security/advisories/20060501-01-U.asc http://lists.suse.com/archive/suse-security-announce/2006-May/0004.html http://secunia.com/advisories/19769 http://secunia.com/advisories/19805 http://secunia.com/advisories/19828 http://secunia.com/advisories/19839 http://secunia.com/advisories/19958 http://secunia.com/advisories/19962 http://secunia.com/advisories/20117 http://secunia.com/advisories/20210 http://secunia.com/advisories/20944 http:/&#x •

CVSS: 5.0EPSS: 3%CPEs: 16EXPL: 0

Multiple unspecified vulnerabilities in Ethereal 0.10.x up to 0.10.14 allow remote attackers to cause a denial of service (crash from null dereference) via (1) multiple vectors in H.248, and the (2) X.509if, (3) SRVLOC, (4) H.245, (5) AIM, and (6) general packet dissectors; and (7) the statistics counter. • ftp://patches.sgi.com/support/free/security/advisories/20060501-01-U.asc http://lists.suse.com/archive/suse-security-announce/2006-May/0004.html http://secunia.com/advisories/19769 http://secunia.com/advisories/19805 http://secunia.com/advisories/19828 http://secunia.com/advisories/19839 http://secunia.com/advisories/19958 http://secunia.com/advisories/19962 http://secunia.com/advisories/20117 http://secunia.com/advisories/20210 http://secunia.com/advisories/20944 http:/&#x •