Page 46 of 582 results (0.012 seconds)

CVSS: 5.9EPSS: 0%CPEs: 2EXPL: 0

The dissect_nhdr_extopt function in epan/dissectors/packet-lbmc.c in the LBMC dissector in Wireshark 2.0.x before 2.0.2 does not validate length values, which allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) via a crafted packet. La función dissect_nhdr_extopt en epan/dissectors/packet-lbmc.c en el disector LBMC en Wireshark 2.0.x en versiones anteriores a 2.0.2 no valida los valores de longitud, lo que permite a atacantes remotos provocar una denegación de servicio (desbordamiento de buffer basado en pila y caída de aplicación) a través de un paquete manipulado. • http://www.securitytracker.com/id/1035118 http://www.wireshark.org/security/wnpa-sec-2016-08.html https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11984 https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=1c090e929269a78bf7a4cb3dc0d34565f4351312 https://security.gentoo.org/glsa/201604-05 • CWE-20: Improper Input Validation •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 1

The ipmi_fmt_udpport function in epan/dissectors/packet-ipmi.c in the IPMI dissector in Wireshark 2.0.x before 2.0.1 improperly attempts to access a packet scope, which allows remote attackers to cause a denial of service (assertion failure and application exit) via a crafted packet. La función ipmi_fmt_udpport en epan/dissectors/packet-ipmi.c en el disector IPMI en Wireshark 2.0.x en versiones anteriores a 2.0.1 intenta acceder a un ámbito de paquete de manera inadecuada, lo que permite a atacantes remotos causar una denegación de servicio (fallo de aserción y salida de aplicación) a través de un paquete manipulado. • https://www.exploit-db.com/exploits/38994 http://www.securityfocus.com/bid/79382 http://www.securitytracker.com/id/1034551 http://www.wireshark.org/security/wnpa-sec-2015-57.html https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11831 https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=96bf82ced0b58c7a4c2a6c300efeebe4f05c0ff4 https://security.gentoo.org/glsa/201604-05 • CWE-20: Improper Input Validation •

CVSS: 5.5EPSS: 0%CPEs: 10EXPL: 1

The dissct_rsl_ipaccess_msg function in epan/dissectors/packet-rsl.c in the RSL dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not reject unknown TLV types, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet. La función dissct_rsl_ipaccess_msg en epan/dissectors/packet-rsl.c en el disector RSL en Wireshark 1.12.x en versiones anteriores a 1.12.9 y 2.0.x en versiones anteriores a 2.0.1 no rechaza tipos TLV desconocidos, lo que permite a atacantes remotos causar una denegación de servicio (lectura fuera de rango y caída de aplicación) a través de un paquete manipulado. • https://www.exploit-db.com/exploits/38996 http://www.debian.org/security/2016/dsa-3516 http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html http://www.securityfocus.com/bid/79382 http://www.securitytracker.com/id/1034551 http://www.wireshark.org/security/wnpa-sec-2015-49.html https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11829 https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=2930d3105c3ff2bfb1278b34ad10e2e71c3b8fb0 https://security.gentoo.o • CWE-20: Improper Input Validation •

CVSS: 5.5EPSS: 0%CPEs: 10EXPL: 1

The dissect_diameter_base_framed_ipv6_prefix function in epan/dissectors/packet-diameter.c in the DIAMETER dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the IPv6 prefix length, which allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) via a crafted packet. La función dissect_diameter_base_framed_ipv6_prefix en epan/dissectors/packet-diameter.c en el disector DIAMETER en Wireshark 1.12.x en versiones anteriores a 1.12.9 y 2.0.x en versiones anteriores a 2.0.1 no valida la longitud del prefijo IPv6, lo que permite a atacantes remotos provocar una denegación de servicio (desbordamiento de buffer basado en pila y caída de aplicación) a través de un paquete manipulado. • https://www.exploit-db.com/exploits/39003 http://www.debian.org/security/2016/dsa-3505 http://www.securityfocus.com/bid/79382 http://www.securitytracker.com/id/1034551 http://www.wireshark.org/security/wnpa-sec-2015-43.html https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11792 https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=aaa28a9d39158ca1033bbd3372cf423abbf4f202 https://security.gentoo.org/glsa/201604-05 • CWE-20: Improper Input Validation CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

The s7comm_decode_ud_cpu_szl_subfunc function in epan/dissectors/packet-s7comm_szl_ids.c in the S7COMM dissector in Wireshark 2.0.x before 2.0.1 does not validate the list count in an SZL response, which allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted packet. La función s7comm_decode_ud_cpu_szl_subfunc en epan/dissectors/packet-s7comm_szl_ids.c en el disector S7COMM en Wireshark 2.0.x en versiones anteriores a 2.0.1 no valida el recuento de lista en una respuesta SZL, lo que permite a atacantes remotos causar una denegación de servicio (error de división por cero y caída de aplicación) a través de un paquete manipulado. • http://www.securitytracker.com/id/1034551 http://www.wireshark.org/security/wnpa-sec-2015-56.html https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11823 https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=858c3f0079f987833fb22eba2c361d1a88ba4103 https://security.gentoo.org/glsa/201604-05 • CWE-20: Improper Input Validation •