Page 3 of 123 results (0.007 seconds)

CVSS: 4.3EPSS: 0%CPEs: 25EXPL: 1

Double free vulnerability in the tvb_uncompress function in epan/tvbuff.c in Wireshark 1.2.x before 1.2.17 and 1.4.x before 1.4.7 allows remote attackers to cause a denial of service (application crash) via a packet with malformed data that uses zlib compression. Doble vulnerabilidad libre en la función tvb_uncompress en epan/tvbuff.c en Wireshark v1.2.x con anterioridad a v1.2.17 y v1.4.x con anterioridad a v1.4.7permite a atacantes remotos provocar una denegación de servicio ( caída de la aplicación) a través de un paquete con de datos con formato incorrecto que utiliza la compresión zlib. • http://anonsvn.wireshark.org/viewvc?view=revision&revision=37081 http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061290.html http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061437.html http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061477.html http://openwall.com/lists/oss-security/2011/05/31/20 http://openwall.com/lists/oss-security/2011/06/01/1 http://openwall.com/lists/oss-security/2011/06/01/11 http://secunia.com/adviso • CWE-399: Resource Management Errors •

CVSS: 4.3EPSS: 0%CPEs: 25EXPL: 2

The snoop_read function in wiretap/snoop.c in Wireshark 1.2.x before 1.2.17 and 1.4.x before 1.4.7 does not properly handle certain virtualizable buffers, which allows remote attackers to cause a denial of service (application crash) via a large length value in a snoop file that triggers a stack-based buffer over-read. La función snoop_read en wiretap/snoop.c de Wireshark v1.2.x antes de v1.2.17 y v1.4.x antes de v1.4.7 no maneja adecuadamente ciertos búfers virtualizables, que permite a atacantes remotos provocar una denegación de servicio ( caída de aplicación) a través de un valor de longitud grande en un archivo de Snoop que desencadena un búfer una sobre-lectura en la pila del búfer. • http://anonsvn.wireshark.org/viewvc?view=revision&revision=37068 http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061290.html http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061437.html http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061477.html http://openwall.com/lists/oss-security/2011/05/31/20 http://openwall.com/lists/oss-security/2011/06/01/1 http://openwall.com/lists/oss-security/2011/06/01/11 http://rhn.redhat.com/ • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 6.8EPSS: 0%CPEs: 21EXPL: 3

The X.509if dissector in Wireshark 1.2.x before 1.2.16 and 1.4.x before 1.4.5 does not properly initialize certain global variables, which allows remote attackers to cause a denial of service (application crash) via a crafted .pcap file. El disector X.509if en Wireshark v1.2.x antes de v1.2.16 y v1.4.x antes de v1.4.5 no inicializa correctamente ciertas variables globales, lo que permite a atacantes remotos provocar una denegación de servicio (Mediante caida de la aplicación) a través de un archivo pcap debidamente modificado. • http://anonsvn.wireshark.org/viewvc?revision=36608&view=revision http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058900.html http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058983.html http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058993.html http://openwall.com/lists/oss-security/2011/04/18/2 http://openwall.com/lists/oss-security/2011/04/18/8 http://secunia.com/advisories/44172 http://secunia.com/advisories/44374 http:/ • CWE-122: Heap-based Buffer Overflow CWE-399: Resource Management Errors •

CVSS: 9.3EPSS: 2%CPEs: 24EXPL: 0

Heap-based buffer overflow in wiretap/pcapng.c in Wireshark before 1.2 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted capture file. Desbordamiento de búfer basado en memoria dinámica en wiretap/pcapng.c de Wireshark en versiones anteriores a v1.2,permite a atacantes remotos causar una denegación de servicio (cuelgue) o ejecutar código arbitrario a través de un fichero de capturas de tráfico manipulado. • http://secunia.com/advisories/43821 http://www.redhat.com/support/errata/RHSA-2011-0370.html http://www.vupen.com/english/advisories/2011/0719 https://bugzilla.redhat.com/show_bug.cgi?id=671331 https://access.redhat.com/security/cve/CVE-2011-0024 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-122: Heap-based Buffer Overflow •

CVSS: 4.3EPSS: 1%CPEs: 19EXPL: 1

wiretap/pcapng.c in Wireshark 1.2.0 through 1.2.14 and 1.4.0 through 1.4.3 allows remote attackers to cause a denial of service (application crash) via a pcap-ng file that contains a large packet-length field. wiretap/pcapng.c de Wireshark 1.2.0 hasta la versión 1.2.14 y 1.4.0 hasta la 1.4.3 permite a atacantes remotos provocar una denegación de servicio (caída de la aplicación) a través de un fichero pcap-ng que contenga un campo packet-length extenso. • http://anonsvn.wireshark.org/viewvc?view=rev&revision=35855 http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055364.html http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055650.html http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055664.html http://secunia.com/advisories/43759 http://secunia.com/advisories/43795 http://secunia.com/advisories/43821 http://secunia.com/advisories/44169 http://www.debian.org/security/2011/dsa-2201 http:/ • CWE-399: Resource Management Errors •