Page 7 of 46 results (0.005 seconds)

CVSS: 5.0EPSS: 11%CPEs: 24EXPL: 0

Ethereal 0.10.1 to 0.10.2 allows remote attackers to cause a denial of service (crash) via a zero-length Presentation protocol selector. Ethereal 0.8.13 a 0.10.2 permite a atacantes remotos causar una denegación de servicio (caída) mediante un seleccionador de protocolo de Presentación de longitud cero. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000835 http://marc.info/?l=bugtraq&m=108058005324316&w=2 http://secunia.com/advisories/11185 http://security.gentoo.org/glsa/glsa-200403-07.xml http://www.ethereal.com/appnotes/enpa-sa-00013.html http://www.ethereal.com/lists/ethereal-dev/200404/msg00296.html http://www.kb.cert.org/vuls/id/792286 http://www.mandriva.com/security/advisories?name=MDKSA-2004:024 http://www.redhat.com/support/errata/RHSA-2004-13 •

CVSS: 5.0EPSS: 93%CPEs: 24EXPL: 2

Multiple buffer overflows in Ethereal 0.8.13 to 0.10.2 allow remote attackers to cause a denial of service and possibly execute arbitrary code via the (1) NetFlow, (2) IGAP, (3) EIGRP, (4) PGM, (5) IrDA, (6) BGP, (7) ISUP, or (8) TCAP dissectors. Múltiples desbordamientos de búfer en Ethereal 0.8.13 a 0.10.2 permite a atacantes remotos causar una denegación de servicio y posiblemente ejecutar código arbitrario mediante los diseccionadores (1) NetFlow, (2) IGAP, (3) EIGRP, (4) PGM, (5) IrDA, (6) BGP, (7) ISUP, o (8) TCAP. • https://www.exploit-db.com/exploits/167 https://www.exploit-db.com/exploits/170 http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000835 http://marc.info/?l=bugtraq&m=108007072215742&w=2 http://marc.info/?l=bugtraq&m=108058005324316&w=2 http://marc.info/?l=bugtraq&m=108213710306260&w=2 http://secunia.com/advisories/11185 http://security.e-matters.de/advisories/032004.html http://security.gentoo.org/glsa/glsa-200403-07.xml http://www.debian.org/secu •

CVSS: 7.5EPSS: 16%CPEs: 1EXPL: 0

The Q.931 dissector in Ethereal before 0.10.0, and Tethereal, allows remote attackers to cause a denial of service (crash) via a malformed Q.931, which triggers a null dereference. El diseccionador Q.931 en Ethereal anteriores a 0.10.0 y Tethereal, permite a atacantes remotos causar una denegación de servicio (caída) mediante un Q.931 malformado, lo que dispara una desreferencia nula. • ftp://patches.sgi.com/support/free/security/advisories/20040103-01-U.asc ftp://patches.sgi.com/support/free/security/advisories/20040202-01-U.asc http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000801 http://secunia.com/advisories/10531 http://secunia.com/advisories/10568 http://secunia.com/advisories/10570 http://www.debian.org/security/2003/dsa-407 http://www.ethereal.com/appnotes/enpa-sa-00012.html http://www.mandriva.com/security/advisories?name=MDKSA-2004:002 • CWE-476: NULL Pointer Dereference •

CVSS: 5.0EPSS: 2%CPEs: 1EXPL: 0

Unknown vulnerability in the DCERPC (DCE/RPC) dissector in Ethereal 0.9.12 and earlier allows remote attackers to cause a denial of service (memory consumption) via a certain NDR string. Vulnerabilidad desconocida en el diseccionador de DCERPC en Ethereal 0.9.12 y anteriores permite a atacantes remotos causar una denegación de servicio (consumición de memoria) mediante una cierta cadena NDR. • ftp://ftp.sco.com/pub/security/OpenLinux/CSSA-2003-030.0.txt http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000662 http://secunia.com/advisories/9007 http://www.debian.org/security/2003/dsa-324 http://www.ethereal.com/appnotes/enpa-sa-00010.html http://www.kb.cert.org/vuls/id/542540 http://www.redhat.com/support/errata/RHSA-2003-077.html https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A75 https://access.redhat.com/ •

CVSS: 7.5EPSS: 2%CPEs: 1EXPL: 0

The OSI dissector in Ethereal 0.9.12 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary code via invalid IPv4 or IPv6 prefix lengths, possibly triggering a buffer overflow. El examinador OSI en Ethereal 0.9.12 y anteriores permite atacantes remotos causar una denegación de servicio y posiblemente ejecutar código arbitrario mediante longitudes de prefijos IPv4 o IPv6 inválidas, posiblemente disparando un desbordamiento de búfer. • ftp://ftp.sco.com/pub/security/OpenLinux/CSSA-2003-030.0.txt http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000662 http://secunia.com/advisories/9007 http://www.debian.org/security/2003/dsa-324 http://www.ethereal.com/appnotes/enpa-sa-00010.html http://www.redhat.com/support/errata/RHSA-2003-077.html https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A84 https://access.redhat.com/security/cve/CVE-2003-0429 https://bugzilla •