Page 6 of 46 results (0.003 seconds)

CVSS: 7.5EPSS: 3%CPEs: 38EXPL: 0

Buffer overflow in the X11 dissector in Ethereal 0.8.10 through 0.10.8 allows remote attackers to execute arbitrary code via a crafted packet. • http://secunia.com/advisories/13946 http://www.ciac.org/ciac/bulletins/p-106.shtml http://www.debian.org/security/2005/dsa-653 http://www.ethereal.com/appnotes/enpa-sa-00017.html http://www.gentoo.org/security/en/glsa/glsa-200501-27.xml http://www.mandriva.com/security/advisories?name=MDKSA-2005:013 http://www.redhat.com/archives/fedora-legacy-announce/2006-January/msg00003.html http://www.redhat.com/support/errata/RHSA-2005-037.html http://www.securityfocus.com/bid •

CVSS: 5.0EPSS: 0%CPEs: 29EXPL: 0

Unknown vulnerability in Ethereal 0.8.13 to 0.10.2 allows attackers to cause a denial of service (segmentation fault) via a malformed color filter file. • http://secunia.com/advisories/11185 http://www.ethereal.com/appnotes/enpa-sa-00013.html http://www.kb.cert.org/vuls/id/695486 http://www.redhat.com/support/errata/RHSA-2004-136.html https://exchange.xforce.ibmcloud.com/vulnerabilities/15572 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10013 https://access.redhat.com/security/cve/CVE-2004-1761 https://bugzilla.redhat.com/show_bug.cgi?id=1617416 •

CVSS: 7.5EPSS: 28%CPEs: 1EXPL: 0

The dissect_attribute_value_pairs function in packet-radius.c for Ethereal 0.8.13 to 0.10.2 allows remote attackers to cause a denial of service (crash) via a malformed RADIUS packet that triggers a null dereference. La función dissect_attribue_value_pairs en packet-radius.c de Ethereal 0.8.13 a 0.10.2 permite a atacantes remotos causar una denegación de servicio (caída) mediante un paquete RADIUS malformado que dispara una desreferencia nula. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000835 http://marc.info/?l=bugtraq&m=108058005324316&w=2 http://marc.info/?l=bugtraq&m=108213710306260&w=2 http://marc.info/?l=ethereal-dev&m=107962966700423&w=2 http://secunia.com/advisories/11185 http://security.gentoo.org/glsa/glsa-200403-07.xml http://www.ethereal.com/appnotes/enpa-sa-00013.html http://www.kb.cert.org/vuls/id/124454 http://www.mandriva.com/security/advisories? • CWE-476: NULL Pointer Dereference •

CVSS: 5.0EPSS: 11%CPEs: 24EXPL: 0

Ethereal 0.10.1 to 0.10.2 allows remote attackers to cause a denial of service (crash) via a zero-length Presentation protocol selector. Ethereal 0.8.13 a 0.10.2 permite a atacantes remotos causar una denegación de servicio (caída) mediante un seleccionador de protocolo de Presentación de longitud cero. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000835 http://marc.info/?l=bugtraq&m=108058005324316&w=2 http://secunia.com/advisories/11185 http://security.gentoo.org/glsa/glsa-200403-07.xml http://www.ethereal.com/appnotes/enpa-sa-00013.html http://www.ethereal.com/lists/ethereal-dev/200404/msg00296.html http://www.kb.cert.org/vuls/id/792286 http://www.mandriva.com/security/advisories?name=MDKSA-2004:024 http://www.redhat.com/support/errata/RHSA-2004-13 •

CVSS: 5.0EPSS: 93%CPEs: 24EXPL: 2

Multiple buffer overflows in Ethereal 0.8.13 to 0.10.2 allow remote attackers to cause a denial of service and possibly execute arbitrary code via the (1) NetFlow, (2) IGAP, (3) EIGRP, (4) PGM, (5) IrDA, (6) BGP, (7) ISUP, or (8) TCAP dissectors. Múltiples desbordamientos de búfer en Ethereal 0.8.13 a 0.10.2 permite a atacantes remotos causar una denegación de servicio y posiblemente ejecutar código arbitrario mediante los diseccionadores (1) NetFlow, (2) IGAP, (3) EIGRP, (4) PGM, (5) IrDA, (6) BGP, (7) ISUP, o (8) TCAP. • https://www.exploit-db.com/exploits/167 https://www.exploit-db.com/exploits/170 http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000835 http://marc.info/?l=bugtraq&m=108007072215742&w=2 http://marc.info/?l=bugtraq&m=108058005324316&w=2 http://marc.info/?l=bugtraq&m=108213710306260&w=2 http://secunia.com/advisories/11185 http://security.e-matters.de/advisories/032004.html http://security.gentoo.org/glsa/glsa-200403-07.xml http://www.debian.org/secu •