Page 8 of 45 results (0.003 seconds)

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

Ethereal 0.9.12 and earlier does not handle certain strings properly, with unknown consequences, in the (1) BGP, (2) WTP, (3) DNS, (4) 802.11, (5) ISAKMP, (6) WSP, (7) CLNP, (8) ISIS, and (9) RMI dissectors. Ethereal 0.9.12 y anteriores no maneja ciertas cadenas adecuadamente, con consecuencias desconocidas, en los disectores (1) BGP, (2) WTP, (3) DNS, (4) 802.11, (5) ISAKMP, (6) WSP, (7) CLNP, (8) ISIS, and (9) RMI. • ftp://ftp.sco.com/pub/security/OpenLinux/CSSA-2003-030.0.txt http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000662 http://secunia.com/advisories/9007 http://www.debian.org/security/2003/dsa-324 http://www.ethereal.com/appnotes/enpa-sa-00010.html http://www.redhat.com/support/errata/RHSA-2003-077.html https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A106 https://access.redhat.com/security/cve/CVE-2003-0432 https://bugzilla&# •

CVSS: 7.5EPSS: 9%CPEs: 1EXPL: 0

Multiple integer overflow vulnerabilities in Ethereal 0.9.11 and earlier allow remote attackers to cause a denial of service and possibly execute arbitrary code via the (1) Mount and (2) PPP dissectors. Múltiples vulnerabilidades de desbordamiento de búfer en Ethereal 0.9.11 y anteriores permiten que atacantes remotos provoquen una denegación de servicio y posiblemente ejecuten código arbitrario mediante los disectores (1) Mount y (2) PPP • http://rhn.redhat.com/errata/RHSA-2003-077.html http://www.debian.org/security/2003/dsa-313 http://www.ethereal.com/appnotes/enpa-sa-00009.html http://www.kb.cert.org/vuls/id/232164 http://www.kb.cert.org/vuls/id/361700 http://www.mandriva.com/security/advisories?name=MDKSA-2003:067 http://www.securityfocus.com/bid/7494 http://www.securityfocus.com/bid/7495 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A73 https://access& •

CVSS: 10.0EPSS: 6%CPEs: 1EXPL: 0

Multiple off-by-one vulnerabilities in Ethereal 0.9.11 and earlier allow remote attackers to cause a denial of service and possibly execute arbitrary code via the (1) AIM, (2) GIOP Gryphon, (3) OSPF, (4) PPTP, (5) Quake, (6) Quake2, (7) Quake3, (8) Rsync, (9) SMB, (10) SMPP, and (11) TSP dissectors, which do not properly use the tvb_get_nstringz and tvb_get_nstringz0 functions. Múltiples vulnerabilidades off-by-one en Ethereal 0.9.11 y anteriores permiten que atacantes remotos provoquen una denegación de servicio y posiblemente ejecuten código arbitrario mediante disectores (1) AIM, (2) GIOP Gryphon, (3) OSPF, (4) PPTP, (5) Quake, (6) Quake2, (7) Quake3, (8) Rsync, (9) SMB, (10) SMPP, y (11) TSP, ya que no están usando apropiadamente las funciones tvb_get_nstringz y tvb_get_nstringz0. • http://www.debian.org/security/2003/dsa-313 http://www.ethereal.com/appnotes/enpa-sa-00009.html http://www.kb.cert.org/vuls/id/641013 http://www.mandriva.com/security/advisories?name=MDKSA-2003:067 http://www.redhat.com/support/errata/RHSA-2003-077.html https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A69 https://access.redhat.com/security/cve/CVE-2003-0356 https://bugzilla.redhat.com/show_bug.cgi?id=1617020 • CWE-193: Off-by-one Error •

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 0

Ethereal 0.9.7 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via malformed packets to the (1) LMP, (2) PPP, or (3) TDS dissectors, possibly related to a missing field for EndVerifyAck messages. • http://www.ethereal.com/appnotes/enpa-sa-00007.html http://www.ethereal.com/cgi-bin/viewcvs.cgi/ethereal/packet-lmp.c#rev1.13 http://www.redhat.com/support/errata/RHSA-2002-290.html https://access.redhat.com/security/cve/CVE-2002-1356 https://bugzilla.redhat.com/show_bug.cgi?id=1616884 •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

Multiple integer signedness errors in the BGP dissector in Ethereal 0.9.7 and earlier allow remote attackers to cause a denial of service (infinite loop) via malformed messages. • http://www.ethereal.com/appnotes/enpa-sa-00007.html http://www.ethereal.com/cgi-bin/viewcvs.cgi/ethereal/packet-bgp.c.diff?r1=1.68&r2=1.69 http://www.redhat.com/support/errata/RHSA-2002-290.html https://access.redhat.com/security/cve/CVE-2002-1355 https://bugzilla.redhat.com/show_bug.cgi?id=1616883 •