CVE-2015-8739 – Wireshark - wmem_alloc Assertion Failure
https://notcve.org/view.php?id=CVE-2015-8739
The ipmi_fmt_udpport function in epan/dissectors/packet-ipmi.c in the IPMI dissector in Wireshark 2.0.x before 2.0.1 improperly attempts to access a packet scope, which allows remote attackers to cause a denial of service (assertion failure and application exit) via a crafted packet. La función ipmi_fmt_udpport en epan/dissectors/packet-ipmi.c en el disector IPMI en Wireshark 2.0.x en versiones anteriores a 2.0.1 intenta acceder a un ámbito de paquete de manera inadecuada, lo que permite a atacantes remotos causar una denegación de servicio (fallo de aserción y salida de aplicación) a través de un paquete manipulado. • https://www.exploit-db.com/exploits/38994 http://www.securityfocus.com/bid/79382 http://www.securitytracker.com/id/1034551 http://www.wireshark.org/security/wnpa-sec-2015-57.html https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11831 https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=96bf82ced0b58c7a4c2a6c300efeebe4f05c0ff4 https://security.gentoo.org/glsa/201604-05 • CWE-20: Improper Input Validation •
CVE-2015-8731 – Wireshark - dissct_rsl_ipaccess_msg Static Out-of-Bounds Read
https://notcve.org/view.php?id=CVE-2015-8731
The dissct_rsl_ipaccess_msg function in epan/dissectors/packet-rsl.c in the RSL dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not reject unknown TLV types, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet. La función dissct_rsl_ipaccess_msg en epan/dissectors/packet-rsl.c en el disector RSL en Wireshark 1.12.x en versiones anteriores a 1.12.9 y 2.0.x en versiones anteriores a 2.0.1 no rechaza tipos TLV desconocidos, lo que permite a atacantes remotos causar una denegación de servicio (lectura fuera de rango y caída de aplicación) a través de un paquete manipulado. • https://www.exploit-db.com/exploits/38996 http://www.debian.org/security/2016/dsa-3516 http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html http://www.securityfocus.com/bid/79382 http://www.securitytracker.com/id/1034551 http://www.wireshark.org/security/wnpa-sec-2015-49.html https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11829 https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=2930d3105c3ff2bfb1278b34ad10e2e71c3b8fb0 https://security.gentoo.o • CWE-20: Improper Input Validation •
CVE-2015-8725 – Wireshark - dissect_diameter_base_framed_ipv6_prefix Stack Buffer Overflow
https://notcve.org/view.php?id=CVE-2015-8725
The dissect_diameter_base_framed_ipv6_prefix function in epan/dissectors/packet-diameter.c in the DIAMETER dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the IPv6 prefix length, which allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) via a crafted packet. La función dissect_diameter_base_framed_ipv6_prefix en epan/dissectors/packet-diameter.c en el disector DIAMETER en Wireshark 1.12.x en versiones anteriores a 1.12.9 y 2.0.x en versiones anteriores a 2.0.1 no valida la longitud del prefijo IPv6, lo que permite a atacantes remotos provocar una denegación de servicio (desbordamiento de buffer basado en pila y caída de aplicación) a través de un paquete manipulado. • https://www.exploit-db.com/exploits/39003 http://www.debian.org/security/2016/dsa-3505 http://www.securityfocus.com/bid/79382 http://www.securitytracker.com/id/1034551 http://www.wireshark.org/security/wnpa-sec-2015-43.html https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11792 https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=aaa28a9d39158ca1033bbd3372cf423abbf4f202 https://security.gentoo.org/glsa/201604-05 • CWE-20: Improper Input Validation CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2015-8738
https://notcve.org/view.php?id=CVE-2015-8738
The s7comm_decode_ud_cpu_szl_subfunc function in epan/dissectors/packet-s7comm_szl_ids.c in the S7COMM dissector in Wireshark 2.0.x before 2.0.1 does not validate the list count in an SZL response, which allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted packet. La función s7comm_decode_ud_cpu_szl_subfunc en epan/dissectors/packet-s7comm_szl_ids.c en el disector S7COMM en Wireshark 2.0.x en versiones anteriores a 2.0.1 no valida el recuento de lista en una respuesta SZL, lo que permite a atacantes remotos causar una denegación de servicio (error de división por cero y caída de aplicación) a través de un paquete manipulado. • http://www.securitytracker.com/id/1034551 http://www.wireshark.org/security/wnpa-sec-2015-56.html https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11823 https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=858c3f0079f987833fb22eba2c361d1a88ba4103 https://security.gentoo.org/glsa/201604-05 • CWE-20: Improper Input Validation •
CVE-2015-8734
https://notcve.org/view.php?id=CVE-2015-8734
The dissect_nwp function in epan/dissectors/packet-nwp.c in the NWP dissector in Wireshark 2.0.x before 2.0.1 mishandles the packet type, which allows remote attackers to cause a denial of service (application crash) via a crafted packet. La función dissect_nwp en epan/dissectors/packet-nwp.c en el disector NWP en Wireshark 2.0.x en versiones anteriores a 2.0.1 no maneja correctamente el tipo de paquete, lo que permite a atacantes remotos causar una denegación de servicio (caída de aplicación) a través de un paquete manipulado. • http://www.securitytracker.com/id/1034551 http://www.wireshark.org/security/wnpa-sec-2015-52.html https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11726 https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=9b2c889abe0219fc162659e106c5b95deb6268f3 https://security.gentoo.org/glsa/201604-05 • CWE-20: Improper Input Validation •