Page 4 of 57 results (0.004 seconds)

CVSS: 3.3EPSS: 0%CPEs: 25EXPL: 0

The CIMD dissector in Wireshark 1.6.x before 1.6.14 and 1.8.x before 1.8.6 allows remote attackers to cause a denial of service (application crash) via a malformed packet. El disector CIMD en Wireshark v1.6.x anterior a v1.6.14 y v1.8.x anterior a v1.8.6 permite a atacantes remotos causar una denegación de servicio (caida de la aplicación) mediante un paquete malformado. • http://lists.opensuse.org/opensuse-updates/2013-03/msg00065.html http://lists.opensuse.org/opensuse-updates/2013-03/msg00077.html http://secunia.com/advisories/52471 http://www.debian.org/security/2013/dsa-2644 http://www.wireshark.org/docs/relnotes/wireshark-1.6.14.html http://www.wireshark.org/docs/relnotes/wireshark-1.8.6.html http://www.wireshark.org/security/wnpa-sec-2013-19.html https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8346 https://oval.cisecurity.org/ •

CVSS: 6.1EPSS: 0%CPEs: 25EXPL: 0

The FCSP dissector in Wireshark 1.6.x before 1.6.14 and 1.8.x before 1.8.6 allows remote attackers to cause a denial of service (infinite loop) via a malformed packet. El disector FCSP en Wireshark v1.6.x anterior a v1.6.14 y v1.8.x anterior a v1.8.6 permite a atacantes remotos causar una denegación de servicio (bucle infinito) mediante un paquete malformado. • http://lists.opensuse.org/opensuse-updates/2013-03/msg00065.html http://lists.opensuse.org/opensuse-updates/2013-03/msg00077.html http://secunia.com/advisories/52471 http://www.wireshark.org/docs/relnotes/wireshark-1.6.14.html http://www.wireshark.org/docs/relnotes/wireshark-1.8.6.html http://www.wireshark.org/security/wnpa-sec-2013-20.html https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8359 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef&# •

CVSS: 3.3EPSS: 0%CPEs: 25EXPL: 0

The dissect_server_info function in epan/dissectors/packet-ms-mms.c in the MS-MMS dissector in Wireshark 1.6.x before 1.6.14 and 1.8.x before 1.8.6 does not properly manage string lengths, which allows remote attackers to cause a denial of service (application crash) via a malformed packet that (1) triggers an integer overflow or (2) has embedded '\0' characters in a string. La función dissect_server_info en epan/dissectors/packet-ms-mms.c en el disertor MS-MMS en Wireshark v1.6.x antes de v1.6.14 y v1.8.x antes de v1.8.6 no maneja correctamente la lingitud de las cadenas, lo que permite a atacantes remtoos causar una denegación de servicios (caída de aplciación) a través de paquetes malformados que (1) dispara un desbordamiento entero o (2) que ha incrustado caracteres '\0' en la cadena. • http://anonsvn.wireshark.org/viewvc/trunk-1.8/epan/dissectors/packet-ms-mms.c?r1=47981&r2=47980&pathrev=47981 http://anonsvn.wireshark.org/viewvc?view=revision&revision=47981 http://lists.opensuse.org/opensuse-updates/2013-03/msg00065.html http://lists.opensuse.org/opensuse-updates/2013-03/msg00077.html http://secunia.com/advisories/52471 http://www.debian.org/security/2013/dsa-2644 http://www.wireshark.org/docs/relnotes/wireshark-1.6.14.html http://www.wireshark.org/docs/relnotes& • CWE-189: Numeric Errors •

CVSS: 5.0EPSS: 0%CPEs: 25EXPL: 0

The DTLS dissector in Wireshark 1.6.x before 1.6.14 and 1.8.x before 1.8.6 does not validate the fragment offset before invoking the reassembly state machine, which allows remote attackers to cause a denial of service (application crash) via a large offset value that triggers write access to an invalid memory location. El disector DTLS en Wireshark v1.6.x anterior a v1.6.14 y v1.8.x anterior a v1.8.6 no valida el offset del fragmento antes de invocar el estado de la máquina, permitiendo a atacantes remotos provocar una denegación de servicio (caída de la aplicación) a través de un gran valor de desplazamiento que desencadena el acceso de escritura a una ubicación de memoria no válida. • http://anonsvn.wireshark.org/viewvc?view=revision&revision=48011 http://lists.opensuse.org/opensuse-updates/2013-03/msg00065.html http://lists.opensuse.org/opensuse-updates/2013-03/msg00077.html http://secunia.com/advisories/52471 http://www.debian.org/security/2013/dsa-2644 http://www.wireshark.org/docs/relnotes/wireshark-1.6.14.html http://www.wireshark.org/docs/relnotes/wireshark-1.8.6.html http://www.wireshark.org/security/wnpa-sec-2013-22.html https://bugs.wireshark.org&#x • CWE-20: Improper Input Validation •

CVSS: 2.9EPSS: 0%CPEs: 18EXPL: 0

The csnStreamDissector function in epan/dissectors/packet-csn1.c in the CSN.1 dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly handle a large number of padding bits, which allows remote attackers to cause a denial of service (infinite loop) via a malformed packet. La función csnStreamDissector enepan/dissectors/packet-csn1.c en el dissector CSN.1 en Wireshark v1.6.x anterior a v1.6.13 y v1.8.x anterior a v1.8.5 no gestiona correctamente un relleno largo de bits, permitiendo a atacantes remotos causar una denegación de servicio (loop infinito) mediante un paquete malformado. • http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-csn1.c?r1=46335&r2=46334&pathrev=46335 http://anonsvn.wireshark.org/viewvc?view=revision&revision=46335 http://lists.opensuse.org/opensuse-updates/2013-02/msg00028.html http://lists.opensuse.org/opensuse-updates/2013-02/msg00037.html http://www.wireshark.org/security/wnpa-sec-2013-01.html https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8037 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3 • CWE-20: Improper Input Validation •