Page 67 of 533 results (0.010 seconds)

CVSS: 3.3EPSS: 0%CPEs: 10EXPL: 0

The dissect_mpls_echo_tlv_dd_map function in epan/dissectors/packet-mpls-echo.c in the MPLS Echo dissector in Wireshark 1.8.x before 1.8.6 allows remote attackers to cause a denial of service (infinite loop) via invalid Sub-tlv data. La función dissect_mpls_echo_tlv_dd_map en epan/dissectors/packet-mpls-echo.c en el disector MPLS Echo en Wireshark v1.8.x anterior a v1.8.6 permite a atacantes remotos causar una denegación de servicio (bucle infinito) mediante un Sub-tlv inválido. • http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-mpls-echo.c?r1=46391&r2=46390&pathrev=46391 http://anonsvn.wireshark.org/viewvc?view=revision&revision=46391 http://lists.opensuse.org/opensuse-updates/2013-03/msg00065.html http://lists.opensuse.org/opensuse-updates/2013-03/msg00077.html http://secunia.com/advisories/52471 http://www.wireshark.org/docs/relnotes/wireshark-1.8.6.html http://www.wireshark.org/security/wnpa-sec-2013-14.html https://bugs.wireshark.org/bugzilla& •

CVSS: 5.0EPSS: 0%CPEs: 25EXPL: 0

The DTLS dissector in Wireshark 1.6.x before 1.6.14 and 1.8.x before 1.8.6 does not validate the fragment offset before invoking the reassembly state machine, which allows remote attackers to cause a denial of service (application crash) via a large offset value that triggers write access to an invalid memory location. El disector DTLS en Wireshark v1.6.x anterior a v1.6.14 y v1.8.x anterior a v1.8.6 no valida el offset del fragmento antes de invocar el estado de la máquina, permitiendo a atacantes remotos provocar una denegación de servicio (caída de la aplicación) a través de un gran valor de desplazamiento que desencadena el acceso de escritura a una ubicación de memoria no válida. • http://anonsvn.wireshark.org/viewvc?view=revision&revision=48011 http://lists.opensuse.org/opensuse-updates/2013-03/msg00065.html http://lists.opensuse.org/opensuse-updates/2013-03/msg00077.html http://secunia.com/advisories/52471 http://www.debian.org/security/2013/dsa-2644 http://www.wireshark.org/docs/relnotes/wireshark-1.6.14.html http://www.wireshark.org/docs/relnotes/wireshark-1.8.6.html http://www.wireshark.org/security/wnpa-sec-2013-22.html https://bugs.wireshark.org&#x • CWE-20: Improper Input Validation •

CVSS: 3.3EPSS: 0%CPEs: 25EXPL: 0

The CIMD dissector in Wireshark 1.6.x before 1.6.14 and 1.8.x before 1.8.6 allows remote attackers to cause a denial of service (application crash) via a malformed packet. El disector CIMD en Wireshark v1.6.x anterior a v1.6.14 y v1.8.x anterior a v1.8.6 permite a atacantes remotos causar una denegación de servicio (caida de la aplicación) mediante un paquete malformado. • http://lists.opensuse.org/opensuse-updates/2013-03/msg00065.html http://lists.opensuse.org/opensuse-updates/2013-03/msg00077.html http://secunia.com/advisories/52471 http://www.debian.org/security/2013/dsa-2644 http://www.wireshark.org/docs/relnotes/wireshark-1.6.14.html http://www.wireshark.org/docs/relnotes/wireshark-1.8.6.html http://www.wireshark.org/security/wnpa-sec-2013-19.html https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8346 https://oval.cisecurity.org/ •

CVSS: 6.1EPSS: 0%CPEs: 10EXPL: 0

The dissect_hartip function in epan/dissectors/packet-hartip.c in the HART/IP dissector in Wireshark 1.8.x before 1.8.6 allows remote attackers to cause a denial of service (infinite loop) via a packet with a header that is too short. La función dissect_hartip en epan/disectores/hartip.c del disector paquetes en HART/IP en Wireshark v1.8.x antes de v1.8.6 permite a atacantes remotos provocar una denegación de servicio (bucle infinito) a través de un paquete con un encabezado que es demasiado corto. • http://anonsvn.wireshark.org/viewvc/trunk-1.8/epan/dissectors/packet-hartip.c?r1=47778&r2=47777&pathrev=47778 http://anonsvn.wireshark.org/viewvc?view=revision&revision=47778 http://lists.opensuse.org/opensuse-updates/2013-03/msg00065.html http://lists.opensuse.org/opensuse-updates/2013-03/msg00077.html http://secunia.com/advisories/52471 http://www.wireshark.org/docs/relnotes/wireshark-1.8.6.html http://www.wireshark.org/security/wnpa-sec-2013-11.html https://bugs.wireshark.org/bugz • CWE-399: Resource Management Errors •

CVSS: 3.3EPSS: 0%CPEs: 25EXPL: 0

The dissect_server_info function in epan/dissectors/packet-ms-mms.c in the MS-MMS dissector in Wireshark 1.6.x before 1.6.14 and 1.8.x before 1.8.6 does not properly manage string lengths, which allows remote attackers to cause a denial of service (application crash) via a malformed packet that (1) triggers an integer overflow or (2) has embedded '\0' characters in a string. La función dissect_server_info en epan/dissectors/packet-ms-mms.c en el disertor MS-MMS en Wireshark v1.6.x antes de v1.6.14 y v1.8.x antes de v1.8.6 no maneja correctamente la lingitud de las cadenas, lo que permite a atacantes remtoos causar una denegación de servicios (caída de aplciación) a través de paquetes malformados que (1) dispara un desbordamiento entero o (2) que ha incrustado caracteres '\0' en la cadena. • http://anonsvn.wireshark.org/viewvc/trunk-1.8/epan/dissectors/packet-ms-mms.c?r1=47981&r2=47980&pathrev=47981 http://anonsvn.wireshark.org/viewvc?view=revision&revision=47981 http://lists.opensuse.org/opensuse-updates/2013-03/msg00065.html http://lists.opensuse.org/opensuse-updates/2013-03/msg00077.html http://secunia.com/advisories/52471 http://www.debian.org/security/2013/dsa-2644 http://www.wireshark.org/docs/relnotes/wireshark-1.6.14.html http://www.wireshark.org/docs/relnotes& • CWE-189: Numeric Errors •