Page 23 of 122 results (0.010 seconds)

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

Off-by-one error in the MIME Multipart dissector in Wireshark (formerly Ethereal) 0.10.1 through 0.99.3 allows remote attackers to cause a denial of service (crash) via certain vectors that trigger an assertion error related to unexpected length values. Error por un paso en el disector MIME Multipart en Wireshark (anteriormente Ethereal) desde la versión 0.10.1 hasta la 0.99.3 permite que atacantes remotos provoquen una denegación de servicio (cierre inesperado) mediante determinados vectores que desencadenan un error de aserción relacionado con valores de longitud inesperados. • ftp://patches.sgi.com/support/free/security/advisories/20061101-01-P http://secunia.com/advisories/22590 http://secunia.com/advisories/22659 http://secunia.com/advisories/22672 http://secunia.com/advisories/22692 http://secunia.com/advisories/22797 http://secunia.com/advisories/22841 http://secunia.com/advisories/22929 http://secunia.com/advisories/23096 http://securitytracker.com/id?1017129 http://support.avaya.com/elmodocs2/security/ASA-2006-255.htm http://www.mandriva.com • CWE-193: Off-by-one Error CWE-617: Reachable Assertion •

CVSS: 5.0EPSS: 2%CPEs: 9EXPL: 0

epan/dissectors/packet-xot.c in the XOT dissector (dissect_xot_pdu) in Wireshark (formerly Ethereal) 0.9.8 through 0.99.3 allows remote attackers to cause a denial of service (memory consumption and crash) via an encoded XOT packet that produces a zero length value when it is decoded. epan/dissectors/packet-xot.c en el separador XOT (dissect_xot_pdu) en Wireshark (antes conocido como Ethereal) 0.9.8 hasta la 0.99.3 permite a un atacante remoto provocar denegación de servicio (consumo de memoria y caida) a través de un paquete XOT codificado que crea un valor de longitud zero cuando está codificado. • ftp://patches.sgi.com/support/free/security/advisories/20061101-01-P http://secunia.com/advisories/22590 http://secunia.com/advisories/22659 http://secunia.com/advisories/22672 http://secunia.com/advisories/22692 http://secunia.com/advisories/22797 http://secunia.com/advisories/22841 http://secunia.com/advisories/22929 http://secunia.com/advisories/23096 http://securitytracker.com/id?1017129 http://support.avaya.com/elmodocs2/security/ASA-2006-255.htm http://www.kb.cert. •

CVSS: 5.0EPSS: 1%CPEs: 1EXPL: 0

Unspecified vulnerability in the HTTP dissector in Wireshark (formerly Ethereal) 0.99.3 allows remote attackers to cause a denial of service (crash) via unspecified vectors. Vulnerabilidad no especificada en el separador HTTP en Wireshark (antes conocido como Ethereal) 0.99.3 permite a un atacante remoto provocar denegación de servicio (caida) a través de vectores no especificados. • ftp://patches.sgi.com/support/free/security/advisories/20061101-01-P http://secunia.com/advisories/22590 http://secunia.com/advisories/22672 http://secunia.com/advisories/22692 http://secunia.com/advisories/22797 http://secunia.com/advisories/22841 http://secunia.com/advisories/22929 http://secunia.com/advisories/23096 http://securitytracker.com/id?1017129 http://support.avaya.com/elmodocs2/security/ASA-2006-255.htm http://www.kb.cert.org/vuls/id/363992 http://www.m •

CVSS: 5.0EPSS: 1%CPEs: 1EXPL: 0

Unspecified vulnerability in the LDAP dissector in Wireshark (formerly Ethereal) 0.99.3 allows remote attackers to cause a denial of service (crash) via a crafted LDAP packet. Vulnerabilidad no especificada en el separador LDAP en Wireshark (antes conocido comoEthereal) 0.99.3 permite a un atacante remoto provocar denegación de servicio (caida) a través de un paquete LDAP manipulado. • ftp://patches.sgi.com/support/free/security/advisories/20061101-01-P http://secunia.com/advisories/22590 http://secunia.com/advisories/22672 http://secunia.com/advisories/22692 http://secunia.com/advisories/22797 http://secunia.com/advisories/22841 http://secunia.com/advisories/22929 http://secunia.com/advisories/23096 http://securitytracker.com/alerts/2006/Oct/1017129.html http://support.avaya.com/elmodocs2/security/ASA-2006-255.htm http://www.mandriva.com/security/advisories? •

CVSS: 5.4EPSS: 1%CPEs: 5EXPL: 0

The SSCOP dissector in Wireshark (formerly Ethereal) before 0.99.3 allows remote attackers to cause a denial of service (resource consumption) via malformed packets that cause the Q.2391 dissector to use excessive memory. El analizador SSCOP en Wireshark (anteriormente Ethereal) anterior a 0.99.3 permite a atacantes ermotos provocar una denegación de servicio (agotamiento de recursos) mediante paquetes mal formados que provocan que el analizador Q.2391 utilice demasiada memoria. • http://secunia.com/advisories/21597 http://secunia.com/advisories/21619 http://secunia.com/advisories/21649 http://secunia.com/advisories/21682 http://secunia.com/advisories/21813 http://secunia.com/advisories/21885 http://secunia.com/advisories/22378 http://security.gentoo.org/glsa/glsa-200608-26.xml http://securitytracker.com/id?1016736 http://support.avaya.com/elmodocs2/security/ASA-2006-227.htm http://www.debian.org/security/2006/dsa-1171 http://www.kb.cert.org • CWE-399: Resource Management Errors •