CVE-2016-5357
https://notcve.org/view.php?id=CVE-2016-5357
wiretap/netscreen.c in the NetScreen file parser in Wireshark 1.12.x before 1.12.12 and 2.x before 2.0.4 mishandles sscanf unsigned-integer processing, which allows remote attackers to cause a denial of service (application crash) via a crafted file. wiretap/netscreen.c en el analizador de archivo NetScreen en Wireshark 1.12.x en versiones anteriores a 1.12.12 y 2.x en versiones anteriores a 2.0.4 no maneja correctamente procesamiento sin signo de entero sscanf, lo que permite a atacantes remotos provocar una denegación de servicio (caída de aplicación) a través de un archivo manipulado. • http://www.debian.org/security/2016/dsa-3615 http://www.openwall.com/lists/oss-security/2016/06/09/3 http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html http://www.securityfocus.com/bid/91140 https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12396 https://github.com/wireshark/wireshark/commit/11edc83b98a61e890d7bb01855389d40e984ea82 https://github.com/wireshark/wireshark/commit/6a140eca7b78b230f1f90a739a32257476513c78 https://www.wireshark.org/security/wnpa-sec-2016-36.html • CWE-20: Improper Input Validation •
CVE-2016-4417
https://notcve.org/view.php?id=CVE-2016-4417
Off-by-one error in epan/dissectors/packet-gsm_abis_oml.c in the GSM A-bis OML dissector in Wireshark 1.12.x before 1.12.10 and 2.x before 2.0.2 allows remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted packet that triggers a 0xff tag value. Error por un paso en epan/dissectors/packet-gsm_abis_oml.c en el disector GSM A-bis OML en Wireshark 1.12.x en versiones anteriores a 1.12.10 y 2.x en versiones anteriores a 2.0.2 permite a atacantes remotos provocar una denegación de servicio (sobrelectura de buffer y caída de aplicación) a través de un paquete manipulado que desencadena un valor de etiqueta 0xff. • http://lists.opensuse.org/opensuse-updates/2016-03/msg00015.html http://lists.opensuse.org/opensuse-updates/2016-03/msg00016.html http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11825 https://www.wireshark.org/security/wnpa-sec-2016-14.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2016-4421
https://notcve.org/view.php?id=CVE-2016-4421
epan/dissectors/packet-ber.c in the ASN.1 BER dissector in Wireshark 1.12.x before 1.12.10 and 2.x before 2.0.2 allows remote attackers to cause a denial of service (deep recursion, stack consumption, and application crash) via a packet that specifies deeply nested data. epan/dissectors/packet-ber.c en el disector ASN.1 BER en Wireshark 1.12.x en versiones anteriores a 1.12.10 y 2.x en versiones anteriores a 2.0.2 permite a atacantes remotos provocar una denegación de servicio (recursión profunda, consumo de pila y caída de aplicación) a través de un paquete que especifica datos profundamente anidados. • http://lists.opensuse.org/opensuse-updates/2016-03/msg00015.html http://lists.opensuse.org/opensuse-updates/2016-03/msg00016.html http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11822 https://www.wireshark.org/security/wnpa-sec-2016-18.html • CWE-20: Improper Input Validation •
CVE-2016-4418
https://notcve.org/view.php?id=CVE-2016-4418
epan/dissectors/packet-ber.c in the ASN.1 BER dissector in Wireshark 1.12.x before 1.12.10 and 2.x before 2.0.2 allows remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted packet that triggers an empty set. epan/dissectors/packet-ber.c en el disector ASN.1 BER en Wireshark 1.12.x en versiones anteriores a 1.12.10 y 2.x en versiones anteriores a 2.0.2 permite a atacantes remotos provocar una denegación de servicio (sobrelectura de buffer y caída de aplicación) a través de un paquete manipulado que desencadena un conjunto vacío. • http://lists.opensuse.org/opensuse-updates/2016-03/msg00015.html http://lists.opensuse.org/opensuse-updates/2016-03/msg00016.html http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12106 https://www.wireshark.org/security/wnpa-sec-2016-15.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2016-4079
https://notcve.org/view.php?id=CVE-2016-4079
epan/dissectors/packet-pktc.c in the PKTC dissector in Wireshark 1.12.x before 1.12.11 and 2.0.x before 2.0.3 does not verify BER identifiers, which allows remote attackers to cause a denial of service (out-of-bounds write and application crash) via a crafted packet. epan/dissectors/packet-pktc.c en el disector PKTC en Wireshark 1.12.x en versiones anteriores a 1.12.11 y 2.0.x en versiones anteriores a 2.0.3 no verifica identificadores BER, lo que permite a atacantes remotos provocar una denegación de servicio (escritura fuera de límites y caída de aplicación) a través de un paquete manipulado. • http://www.debian.org/security/2016/dsa-3585 http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html http://www.securitytracker.com/id/1035685 http://www.wireshark.org/security/wnpa-sec-2016-22.html https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12206 https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=4cdc9eeba58f866bd5f273e9c5b3876857a7a4bf • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •