Page 8 of 44 results (0.008 seconds)

CVSS: 5.4EPSS: 0%CPEs: 36EXPL: 2

The (1) SMB and (2) SMB2 dissectors in Wireshark 0.9.0 through 1.2.4 allow remote attackers to cause a denial of service (crash) via a crafted packet that triggers a NULL pointer dereference, as demonstrated by fuzz-2009-12-07-11141.pcap. El analizador (1) SMB y (2) SMB2 en Wireshark v0.9.0 hasta v1.2.4 permite a atacantes remotos provocar una denegación de servicio (caída) mediante un paquete modificado, como se ha demostrado por fuzz-2009-12-07-11141.pcap. • http://osvdb.org/61178 http://secunia.com/advisories/37842 http://secunia.com/advisories/37916 http://www.debian.org/security/2009/dsa-1983 http://www.mandriva.com/security/advisories?name=MDVSA-2010:031 http://www.securityfocus.com/bid/37407 http://www.securitytracker.com/id?1023374 http://www.vupen.com/english/advisories/2009/3596 http://www.wireshark.org/security/wnpa-sec-2009-09.html https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4301 https://oval.cisecurity&# •

CVSS: 4.3EPSS: 0%CPEs: 6EXPL: 0

The IPMI dissector in Wireshark 1.2.0 through 1.2.4 on Windows allows remote attackers to cause a denial of service (crash) via a crafted packet, related to "formatting a date/time using strftime." El analizador IPMI en Wireshark v1.2.0 hasta v1.2.4, cuando se ejecuta en Windows, permite a atacantes remotos provocar una denegación de servicio (caída) mediante un paquete modificado, relacionado con "el formateado de fecha/hora usando strftime". • http://osvdb.org/61179 http://secunia.com/advisories/37842 http://www.securityfocus.com/bid/37407 http://www.securitytracker.com/id?1023374 http://www.vupen.com/english/advisories/2009/3596 http://www.wireshark.org/security/wnpa-sec-2009-09.html https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=4319 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7576 https://www.redhat.com/archives/fedora-package-announce/2009-December/msg01248.html •

CVSS: 5.0EPSS: 0%CPEs: 4EXPL: 0

packet-paltalk.c in the Paltalk dissector in Wireshark 1.2.0 through 1.2.2, on SPARC and certain other platforms, allows remote attackers to cause a denial of service (application crash) via a file that records a malformed packet trace. packet-paltalk.c en el analizador Paltalk en Wireshark desde v1.2.0 hasta v1.2.2, en SPARC y algunas otras plataformas, permite a atacantes remotos producir una denegación de servicio (caída de aplicación) a través de un fichero que almacena la ruta de un paquete manipulado. • http://secunia.com/advisories/37175 http://secunia.com/advisories/37409 http://www.securityfocus.com/bid/36846 http://www.vupen.com/english/advisories/2009/3061 http://www.wireshark.org/docs/relnotes/wireshark-1.2.3.html http://www.wireshark.org/security/wnpa-sec-2009-07.html https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=3689 https://exchange.xforce.ibmcloud.com/vulnerabilities/54016 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6391 • CWE-20: Improper Input Validation •

CVSS: 9.3EPSS: 6%CPEs: 53EXPL: 0

Integer overflow in wiretap/erf.c in Wireshark before 1.2.2 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted erf file, related to an "unsigned integer wrap vulnerability." Desbordamiento de entero en wiretap/erf.c en Wireshark en versiones anteriores a v1.2.2 permite a atacantes remotos ejecutar código arbitrario o producir una denegación de servicio (caída de aplicación) a través de un fichero erf manipulado, relacionado con la vulnerabilidad " sobreescritura de entero sin asignar". • http://anonsvn.wireshark.org/viewvc/trunk/wiretap/erf.c?view=markup&pathrev=29364 http://secunia.com/advisories/37409 http://secunia.com/advisories/37477 http://www.debian.org/security/2009/dsa-1942 http://www.kb.cert.org/vuls/id/676492 http://www.wireshark.org/docs/relnotes/wireshark-1.2.2.html https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=3849 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5979 https://oval.cisecurity.org/repo • CWE-189: Numeric Errors •

CVSS: 5.0EPSS: 0%CPEs: 3EXPL: 0

Off-by-one error in the dissect_negprot_response function in packet-smb.c in the SMB dissector in Wireshark 1.2.0 through 1.2.2 allows remote attackers to cause a denial of service (application crash) via a file that records a malformed packet trace. NOTE: some of these details are obtained from third party information. Error de superación de límite (Off-by-one) en la función dissect_negprot_response en packet-smb.c en "SMB dissector" en Wireshark desde v1.2.0 hasta v1.2.2 permite a atacantes remotos producir una denegación de servicio (caída de aplicación) a través de un fichero que archiva la traza de un paquete manipulado. NOTA: Algunos de los detalles se obtuvieron de terceros. • http://secunia.com/advisories/37175 http://secunia.com/advisories/37409 http://www.securityfocus.com/bid/36846 http://www.vupen.com/english/advisories/2009/3061 http://www.wireshark.org/docs/relnotes/wireshark-1.2.3.html http://www.wireshark.org/security/wnpa-sec-2009-07.html https://exchange.xforce.ibmcloud.com/vulnerabilities/54018 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6049 • CWE-189: Numeric Errors •