
CVE-2019-10900
https://notcve.org/view.php?id=CVE-2019-10900
09 Apr 2019 — In Wireshark 3.0.0, the Rbm dissector could go into an infinite loop. This was addressed in epan/dissectors/file-rbm.c by handling unknown object types safely. En Wireshark 3.0.0, el disector Rbm podía entrar en un bucle infinito. Esto fue tratado en epan/disectors/file-rbm.c manejando tipos de objetos desconocidos de forma segura. • http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html • CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') •

CVE-2019-10901 – Ubuntu Security Notice USN-3986-1
https://notcve.org/view.php?id=CVE-2019-10901
09 Apr 2019 — In Wireshark 2.4.0 to 2.4.13, 2.6.0 to 2.6.7, and 3.0.0, the LDSS dissector could crash. This was addressed in epan/dissectors/packet-ldss.c by handling file digests properly. En Wireshark 2.4.0 a 2.4.13, 2.6.0 a 2.6.7 y 3.0.0, el disector LDSS podría cerrarse de forma inesperada. Esto fue tratado en epan/disectores/packet-ldsss.c mediante el manejo adecuado de los archivos de digest. It was discovered that Wireshark improperly handled certain input. • http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00022.html • CWE-476: NULL Pointer Dereference •

CVE-2019-10902
https://notcve.org/view.php?id=CVE-2019-10902
09 Apr 2019 — In Wireshark 3.0.0, the TSDNS dissector could crash. This was addressed in epan/dissectors/packet-tsdns.c by splitting strings safely. En Wireshark 3.0.0, el disector TSDNS podría cerrarse de forma inesperada. Esto fue tratado en epan/disectors/packet-tsdns.c dividiendo las cadenas de forma segura. • http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html • CWE-252: Unchecked Return Value •

CVE-2019-10903
https://notcve.org/view.php?id=CVE-2019-10903
09 Apr 2019 — In Wireshark 2.4.0 to 2.4.13, 2.6.0 to 2.6.7, and 3.0.0, the DCERPC SPOOLSS dissector could crash. This was addressed in epan/dissectors/packet-dcerpc-spoolss.c by adding a boundary check. En Wireshark 2.4.0 a 2.4.13, 2.6.0 a 2.6.7, y 3.0.0, el disector DCERPC SPOOLSS podría cerrarse inesperadamente. Esto fue tratado en epan/disectores/packet-dcerpc-spoolss.c añadiendo una comprobación de límites. • http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00022.html • CWE-125: Out-of-bounds Read •

CVE-2019-9208 – Debian Security Advisory 4416-1
https://notcve.org/view.php?id=CVE-2019-9208
28 Feb 2019 — In Wireshark 2.4.0 to 2.4.12 and 2.6.0 to 2.6.6, the TCAP dissector could crash. This was addressed in epan/dissectors/asn1/tcap/tcap.cnf by avoiding NULL pointer dereferences. En Wireshark, desde la versión 2.4.0 hasta la 2.4.12 y desde la 2.60 hasta la 2.6.6, el disector TCAP podría cerrarse inesperadamente. Esto se abordó en epan/dissectors/asn1/tcap/tcap.cn evitando desreferencias de puntero NULL. It was discovered that Wireshark, a network traffic analyzer, contained several vulnerabilities in the diss... • http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00007.html • CWE-476: NULL Pointer Dereference •

CVE-2019-9214 – Debian Security Advisory 4416-1
https://notcve.org/view.php?id=CVE-2019-9214
28 Feb 2019 — In Wireshark 2.4.0 to 2.4.12 and 2.6.0 to 2.6.6, the RPCAP dissector could crash. This was addressed in epan/dissectors/packet-rpcap.c by avoiding an attempted dereference of a NULL conversation. En Wireshark, desde la versión 2.4.0 hasta la 2.4.12 y desde la 2.60 hasta la 2.6.6, el disector RPCAP podría cerrarse inesperadamente. Esto se trató en epan/dissectors/packet-rpcap.c evitando un intento de desreferencia de una conversación NULL. It was discovered that Wireshark improperly handled certain input. • http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00007.html • CWE-476: NULL Pointer Dereference •

CVE-2019-9209 – Debian Security Advisory 4416-1
https://notcve.org/view.php?id=CVE-2019-9209
28 Feb 2019 — In Wireshark 2.4.0 to 2.4.12 and 2.6.0 to 2.6.6, the ASN.1 BER and related dissectors could crash. This was addressed in epan/dissectors/packet-ber.c by preventing a buffer overflow associated with excessive digits in time values. En Wireshark, desde la versión 2.4.0 hasta la 2.4.12 y desde la 2.6.0 hasta la 2.6.6, el disector ASN.1 BER y relacionados podrían cerrarse inesperadamente. Esto se abordó en epan/dissectors/packet-ber.c, previniendo un desbordamiento de búfer asociado con dígitos excesivos en los... • http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00007.html • CWE-193: Off-by-one Error CWE-787: Out-of-bounds Write •

CVE-2019-5716 – Debian Security Advisory 4416-1
https://notcve.org/view.php?id=CVE-2019-5716
08 Jan 2019 — In Wireshark 2.6.0 to 2.6.5, the 6LoWPAN dissector could crash. This was addressed in epan/dissectors/packet-6lowpan.c by avoiding use of a TVB before its creation. En Wireshark desde la versión 2.6.0 hasta la 2.6.5, el disector 6LoWPAN podría cerrarse inesperadamente. Esto se trató en epan/dissectors/packet-6lowpan.c, evitando el uso de un TVB antes de su creación. It was discovered that Wireshark, a network traffic analyzer, contained several vulnerabilities in the dissectors for 6LoWPAN, P_MUL, RTSE, ISA... • http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html • CWE-20: Improper Input Validation •

CVE-2019-5717 – Debian Security Advisory 4416-1
https://notcve.org/view.php?id=CVE-2019-5717
08 Jan 2019 — In Wireshark 2.6.0 to 2.6.5 and 2.4.0 to 2.4.11, the P_MUL dissector could crash. This was addressed in epan/dissectors/packet-p_mul.c by rejecting the invalid sequence number of zero. En Wireshark, desde la versión 2.6.0 hasta la 2.6.5 y desde la 2.4.0 hasta la 2.4.11, el disector P_MUL podría cerrarse inesperadamente. Esto se trató en epan/dissectors/packet-p_mul.c, rechazando el número de secuencia de cero no válido. It was discovered that Wireshark, a network traffic analyzer, contained several vulnerab... • http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html • CWE-20: Improper Input Validation •

CVE-2019-5718 – Debian Security Advisory 4416-1
https://notcve.org/view.php?id=CVE-2019-5718
08 Jan 2019 — In Wireshark 2.6.0 to 2.6.5 and 2.4.0 to 2.4.11, the RTSE dissector and other ASN.1 dissectors could crash. This was addressed in epan/charsets.c by adding a get_t61_string length check. En Wireshark, desde la versión 2.6.0 hasta la 2.6.5 y desde la 2.4.0 hasta la 2.4.11, el disector RTSE y otros disectores ASN.1 podrían cerrarse inesperadamente. Esto se trató en epan/charsets.c, añadiendo una comprobación de longitud "get_t61_string". It was discovered that Wireshark, a network traffic analyzer, contained ... • http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html • CWE-125: Out-of-bounds Read •