Page 8 of 533 results (0.005 seconds)

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 1

In Wireshark 2.4.0 to 2.4.5 and 2.2.0 to 2.2.13, epan/dissectors/packet-h223.c has a memory leak. En Wireshark 2.4.0 a 2.4.5 y 2.2.0 a 2.2.13, epan/dissectors/packet-h223.c tiene una fuga de memoria. • https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14487 https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=6e3b90824a82724f445a0374e99f0b76e4cf5e8b https://www.wireshark.org/security/wnpa-sec-2018-24.html • CWE-772: Missing Release of Resource after Effective Lifetime •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 1

In Wireshark 2.4.0 to 2.4.5 and 2.2.0 to 2.2.13, ui/failure_message.c has a memory leak. En Wireshark 2.4.0 a 2.4.5 y 2.2.0 a 2.2.13, ui/failure_message.c tiene una fuga de memoria. • https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14489 https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=211845aba4794720ae265c782cdffddae54a3e7a https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=f38e895dfc0d97bce64f73ce99df706911d9aa07 https://www.wireshark.org/security/wnpa-sec-2018-24.html • CWE-772: Missing Release of Resource after Effective Lifetime •

CVSS: 7.5EPSS: 0%CPEs: 4EXPL: 0

In Wireshark 2.2.0 to 2.2.12 and 2.4.0 to 2.4.4, the pcapng file parser could crash. This was addressed in wiretap/pcapng.c by adding a block-size check for sysdig event blocks. En Wireshark 2.2.0 a 2.2.12 y 2.4.0 a 2.4.4, el analizador de archivos pcapng podría cerrarse inesperadamente. Esto se trató en wiretap/pcapng.c añadiendo una comprobación block-size para los bloques de evento sysdig. • http://www.securityfocus.com/bid/103163 https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14403 https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=129e41f9f63885ad8224ef413c2860788fb9e849 https://lists.debian.org/debian-lts-announce/2018/04/msg00018.html https://lists.debian.org/debian-lts-announce/2019/01/msg00010.html https://www.wireshark.org/security/wnpa-sec-2018-11.html •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 1

In Wireshark 2.2.0 to 2.2.12 and 2.4.0 to 2.4.4, the DMP dissector could go into an infinite loop. This was addressed in epan/dissectors/packet-dmp.c by correctly supporting a bounded number of Security Categories for a DMP Security Classification. En Wireshark 2.2.0 a 2.2.12 y 2.4.0 a 2.4.4, el disector DMP podría entrar en un bucle infinito. Esto se trató en epan/dissectors/packet-dmp.c soportando correctamente un número limitado de Security Categories para DMP Security Classification. • https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14408 https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=656812ee1f2a8ddfd383b02a066e888f5919e17a https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=e8be5adae469ba563acfad2c2b98673e1afaf901 https://www.wireshark.org/security/wnpa-sec-2018-06.html • CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-thrift.c had a large loop that was addressed by not proceeding with dissection after encountering an unexpected type. En Wireshark 2.4.0 a 2.4.4 y 2.2.0 a 2.2.12, epan/dissectors/packet-thrift.c tenía un gran bucle que se abordó no procediendo con la disección tras encontrar un tipo inesperado. • http://www.securityfocus.com/bid/103158 https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14379 https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=c784d551ad50864de1035ce54e72837301cf6aca https://www.wireshark.org/security/wnpa-sec-2018-06.html • CWE-834: Excessive Iteration •