Page 8 of 59 results (0.008 seconds)

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 0

In Wireshark 2.6.0 to 2.6.3, the CoAP dissector could crash. This was addressed in epan/dissectors/packet-coap.c by ensuring that the piv length is correctly computed. En Wireshark desde la versión 2.6.0 hasta la 2.6.3, el disector CoAP podría cerrarse inesperadamente. Esto se trató en epan/dissectors/packet-coap.c garantizando que la longitud de piv se calcula correctamente. • http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html http://www.securityfocus.com/bid/105583 http://www.securitytracker.com/id/1041909 https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15172 https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=b2bbd9fdf209911d94b23cc33f4daccbceb7fa8a https://www.debian.org/security/2018/dsa-4359 https://www.wireshark.org/security/wnpa-sec-2018-49.html • CWE-682: Incorrect Calculation •

CVSS: 7.5EPSS: 0%CPEs: 5EXPL: 0

In Wireshark 2.6.0 to 2.6.2, 2.4.0 to 2.4.8, and 2.2.0 to 2.2.16, the Radiotap dissector could crash. This was addressed in epan/dissectors/packet-ieee80211-radiotap-iter.c by validating iterator operations. En Wireshark, de la versión 2.6.0 a la 2.6.2, de la versión 2.4.0 a la 2.4.8 y de la versión 2.2.0 a la 2.2.16, el disector Radiotap podría cerrarse inesperadamente. Esto se trató en epan/dissectors/packet-ieee80211-radiotap-iter.c validando las operaciones iterator. • http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html http://www.securityfocus.com/bid/105174 http://www.securitytracker.com/id/1041609 https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15022 https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=bbf46eb46ae38392af8e6cd288795f0def50a621 https://lists.debian.org/debian-lts-announce/2019/01/msg00010.html https://www.debian.org/security/2018/dsa-4315 https://www.wireshark.org/security/wnpa-sec-2018-46.html ht • CWE-20: Improper Input Validation •

CVSS: 7.5EPSS: 0%CPEs: 4EXPL: 0

In Wireshark 2.6.0 to 2.6.2, 2.4.0 to 2.4.8, and 2.2.0 to 2.2.16, the Bluetooth Attribute Protocol dissector could crash. This was addressed in epan/dissectors/packet-btatt.c by verifying that a dissector for a specific UUID exists. En Wireshark, de la versión 2.6.0 a la 2.6.2, de la versión 2.4.0 a la 2.4.8 y de la versión 2.2.0 a la 2.2.16, el disector Bluetooth Attribute Protocol podría cerrarse inesperadamente. Esto se abordó en epan/dissectors/packet-btatt.c verificando que existe un disector para un UUID concreto. • http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html http://www.securityfocus.com/bid/105174 http://www.securitytracker.com/id/1041609 https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14994 https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=f98fbce64cb230e94a2cafc410a3cedad657b485 https://www.debian.org/security/2018/dsa-4315 https://www.wireshark.org/security/wnpa-sec-2018-45.html •

CVSS: 7.5EPSS: 0%CPEs: 5EXPL: 0

In Wireshark 2.6.0 to 2.6.2, 2.4.0 to 2.4.8, and 2.2.0 to 2.2.16, the Bluetooth AVDTP dissector could crash. This was addressed in epan/dissectors/packet-btavdtp.c by properly initializing a data structure. En Wireshark, de la versión 2.6.0 a la 2.6.2, de la versión 2.4.0 a la 2.4.8 y de la versión 2.2.0 a la 2.2.16, el disector Bluetooth AVDTP podría cerrarse inesperadamente. Esto se trató en epan/dissectors/packet-btavdtp.c inicializando correctamente una estructura de datos. • http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html http://www.securityfocus.com/bid/105174 http://www.securitytracker.com/id/1041609 https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14884 https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=c48d6a6d60c5c9111838a945966b6cb8750777be https://lists.debian.org/debian-lts-announce/2019/01/msg00010.html https://www.debian.org/security/2018/dsa-4315 https://www.wireshark.org/security/wnpa-sec-2018-44.html • CWE-665: Improper Initialization •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

In Wireshark through 2.6.2, the create_app_running_mutex function in wsutil/file_util.c calls SetSecurityDescriptorDacl to set a NULL DACL, which allows attackers to modify the access control arbitrarily. En Wireshark hasta la versión 2.6.2, la función create_app_running_mutex en wsutil/file_util.c llama a SetSecurityDescriptorDacl para establecer un DACL NULL que permite que los atacantes modifiquen el control de acceso de forma arbitraria. • http://www.securityfocus.com/bid/104876 https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14921 • CWE-20: Improper Input Validation •