Page 4 of 68 results (0.004 seconds)

CVSS: 5.0EPSS: 2%CPEs: 35EXPL: 0

Multiple unspecified vulnerabilities in Ethereal 0.9.x up to 0.10.14 allow remote attackers to cause a denial of service (crash from null dereference) via (1) an invalid display filter, or the (2) GSM SMS, (3) ASN.1-based, (4) DCERPC NT, (5) PER, (6) RPC, (7) DCERPC, and (8) ASN.1 dissectors. • ftp://patches.sgi.com/support/free/security/advisories/20060501-01-U.asc http://lists.suse.com/archive/suse-security-announce/2006-May/0004.html http://secunia.com/advisories/19769 http://secunia.com/advisories/19805 http://secunia.com/advisories/19828 http://secunia.com/advisories/19839 http://secunia.com/advisories/19958 http://secunia.com/advisories/19962 http://secunia.com/advisories/20117 http://secunia.com/advisories/20210 http://secunia.com/advisories/20944 http:/&#x •

CVSS: 5.0EPSS: 4%CPEs: 18EXPL: 0

Buffer overflow in Ethereal 0.9.15 up to 0.10.14 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via the COPS dissector. • ftp://patches.sgi.com/support/free/security/advisories/20060501-01-U.asc http://lists.suse.com/archive/suse-security-announce/2006-May/0004.html http://secunia.com/advisories/19769 http://secunia.com/advisories/19805 http://secunia.com/advisories/19828 http://secunia.com/advisories/19839 http://secunia.com/advisories/19958 http://secunia.com/advisories/19962 http://secunia.com/advisories/20117 http://secunia.com/advisories/20210 http://secunia.com/advisories/20944 http:/&#x •

CVSS: 7.8EPSS: 1%CPEs: 30EXPL: 0

Unspecified vulnerability in the GTP dissector for Ethereal 0.9.1 to 0.10.13 allows remote attackers to cause a denial of service (infinite loop) via unknown attack vectors. • ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U http://lists.suse.de/archive/suse-security-announce/2006-Feb/0008.html http://secunia.com/advisories/18229 http://secunia.com/advisories/18426 http://secunia.com/advisories/18911 http://secunia.com/advisories/19012 http://secunia.com/advisories/19230 http://securityreason.com/securityalert/304 http://securitytracker.com/id?1015414 http://www.ethereal.com/appnotes/enpa-sa-00022.html http://www.osvdb.org/22092& •

CVSS: 7.5EPSS: 3%CPEs: 39EXPL: 0

Stack-based buffer overflow in the dissect_ospf_v3_address_prefix function in the OSPF protocol dissector in Ethereal 0.10.12, and possibly other versions, allows remote attackers to execute arbitrary code via crafted packets. • ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U http://anonsvn.ethereal.com/viewcvs/viewcvs.py/trunk/epan/dissectors/packet-ospf.c http://lists.suse.de/archive/suse-security-announce/2006-Feb/0008.html http://secunia.com/advisories/17973 http://secunia.com/advisories/18012 http://secunia.com/advisories/18062 http://secunia.com/advisories/18331 http://secunia.com/advisories/18426 http://secunia.com/advisories/18911 http://secunia.com/advisories/19012 http:&#x •

CVSS: 5.0EPSS: 0%CPEs: 39EXPL: 0

The IRC protocol dissector in Ethereal 0.10.13 allows remote attackers to cause a denial of service (infinite loop). • ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U http://secunia.com/advisories/17370 http://secunia.com/advisories/17377 http://secunia.com/advisories/17480 http://secunia.com/advisories/18331 http://secunia.com/advisories/18426 http://secunia.com/advisories/18911 http://secunia.com/advisories/19130 http://secunia.com/advisories/19230 http://securitytracker.com/id?1015414 http://www.ethereal.com/appnotes/enpa-sa-00022.html http://www.gentoo.org/security&# •