CVE-2012-4295
https://notcve.org/view.php?id=CVE-2012-4295
Array index error in the channelised_fill_sdh_g707_format function in epan/dissectors/packet-erf.c in the ERF dissector in Wireshark 1.8.x before 1.8.2 might allow remote attackers to cause a denial of service (application crash) via a crafted speed (aka rate) value. Error de índice de array en la función channelised_fill_sdh_g707_format en epan/disectores/erf.c en el disector ERF en Wireshark v1.8.x antes de v1.8.2 podría permitir a atacantes remotos provocar una denegación de servicio (por caída de la aplicación) a través de un valor de velocidad (aka rate) modificado. • http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-erf.c?r1=44419&r2=44418&pathrev=44419 http://anonsvn.wireshark.org/viewvc?view=revision&revision=44419 http://secunia.com/advisories/50276 http://secunia.com/advisories/51363 http://secunia.com/advisories/54425 http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml http://www.securityfocus.com/bid/55035 http://www.wireshark.org/security/wnpa-sec-2012-16.html https://blogs.oracle.com/sunsecurity/entry/multiple_vulner • CWE-20: Improper Input Validation •
CVE-2012-4294
https://notcve.org/view.php?id=CVE-2012-4294
Buffer overflow in the channelised_fill_sdh_g707_format function in epan/dissectors/packet-erf.c in the ERF dissector in Wireshark 1.8.x before 1.8.2 allows remote attackers to execute arbitrary code via a large speed (aka rate) value. Un desbordamiento de búfer en la función channelised_fill_sdh_g707_format en epan/dissectors/packet-erf.c en el disector de ERF en Wireshark v1.8.x antes de v1.8.2 permite a atacantes remotos ejecutar código de su elección a través de un valor de velocidad (aka rate) demasiado grande. • http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-erf.c?r1=44377&r2=44376&pathrev=44377 http://anonsvn.wireshark.org/viewvc?view=revision&revision=44377 http://secunia.com/advisories/50276 http://secunia.com/advisories/51363 http://secunia.com/advisories/54425 http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml http://www.securityfocus.com/bid/55035 http://www.wireshark.org/security/wnpa-sec-2012-16.html https://blogs.oracle.com/sunsecurity/entry/multiple_vulner • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2012-4297
https://notcve.org/view.php?id=CVE-2012-4297
Buffer overflow in the dissect_gsm_rlcmac_downlink function in epan/dissectors/packet-gsm_rlcmac.c in the GSM RLC MAC dissector in Wireshark 1.6.x before 1.6.10 and 1.8.x before 1.8.2 allows remote attackers to execute arbitrary code via a malformed packet. Un desbordamiento de búfer en la función dissect_gsm_rlcmac_downlink en epan/ dissectors/packet-gsm_rlcmac.c en GSM RLC MAC dissector en Wireshark v1.6.x antes de v1.6.10 y v1.8.x antes de v1.8.2 permite a atacantes remotos ejecutar código de su elección a través de un paquete con formato erróneo. • http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-gsm_rlcmac.h?r1=44307&r2=44306&pathrev=44307 http://anonsvn.wireshark.org/viewvc?view=revision&revision=44307 http://secunia.com/advisories/50276 http://secunia.com/advisories/51363 http://secunia.com/advisories/54425 http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml http://www.securityfocus.com/bid/55035 http://www.wireshark.org/security/wnpa-sec-2012-19.html https://blogs.oracle.com/sunsecurity/entry/multiple • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2012-4288 – wireshark: DoS via excessive resource consumption in XTP dissector (wnpa-sec-2012-15)
https://notcve.org/view.php?id=CVE-2012-4288
Integer overflow in the dissect_xtp_ecntl function in epan/dissectors/packet-xtp.c in the XTP dissector in Wireshark 1.4.x before 1.4.15, 1.6.x before 1.6.10, and 1.8.x before 1.8.2 allows remote attackers to cause a denial of service (loop or application crash) via a large value for a span length. Desbordamiento de entero en la función dissect_xtp_ecntl en epan/dissectors/packet-xtp.c en el (XTP dissector) en Wireshark v1.4.x anterior a v1.4.15, v1.6.x anterior a v1.6.10, y v1.8.x anterior a v1.8.2 permite a atacantes remotos causar una denegación de servicio, bucle y consumo de CPU, a través de un valor grande para un la longitud de un (SPAN). • http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-xtp.c?r1=44289&r2=44288&pathrev=44289 http://anonsvn.wireshark.org/viewvc?view=revision&revision=44289 http://lists.opensuse.org/opensuse-updates/2012-08/msg00033.html http://secunia.com/advisories/50276 http://secunia.com/advisories/51363 http://secunia.com/advisories/54425 http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml http://www.securityfocus.com/bid/55035 http://www.wireshark.org/security/wnpa-sec-2012 • CWE-189: Numeric Errors •
CVE-2012-4296
https://notcve.org/view.php?id=CVE-2012-4296
Buffer overflow in epan/dissectors/packet-rtps2.c in the RTPS2 dissector in Wireshark 1.4.x before 1.4.15, 1.6.x before 1.6.10, and 1.8.x before 1.8.2 allows remote attackers to cause a denial of service (CPU consumption) via a malformed packet. Un desbordamiento de búfer en epan/dissectors/packet-rtps2.c en el disector RTPS2 en Wireshark v1.4.x antes de v1.4.15, v1.6.10 antes v1.6.x, y v1.8.x antes de v1.8.2 permite a atacantes remotos provocar una denegación de servicio (por excesivo consumo de CPU) a través de un paquete mal formado. • http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-rtps2.c?r1=44320&r2=44319&pathrev=44320 http://anonsvn.wireshark.org/viewvc?view=revision&revision=44320 http://lists.opensuse.org/opensuse-updates/2012-08/msg00033.html http://secunia.com/advisories/50276 http://secunia.com/advisories/51363 http://secunia.com/advisories/54425 http://www.debian.org/security/2012/dsa-2590 http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml http://www.securityfocus.com/bid/55035 • CWE-399: Resource Management Errors •