CVE-2024-9781 – Improper Handling of Missing Values in Wireshark
https://notcve.org/view.php?id=CVE-2024-9781
AppleTalk and RELOAD Framing dissector crash in Wireshark 4.4.0 and 4.2.0 to 4.2.7 allows denial of service via packet injection or crafted capture file • https://www.wireshark.org/security/wnpa-sec-2024-13.html https://gitlab.com/wireshark/wireshark/-/issues/20114 • CWE-230: Improper Handling of Missing Values •
CVE-2024-9780 – Missing Initialization of a Variable in Wireshark
https://notcve.org/view.php?id=CVE-2024-9780
ITS dissector crash in Wireshark 4.4.0 allows denial of service via packet injection or crafted capture file • https://www.wireshark.org/security/wnpa-sec-2024-12.html https://gitlab.com/wireshark/wireshark/-/issues/20026 • CWE-456: Missing Initialization of a Variable •
CVE-2024-35202
https://notcve.org/view.php?id=CVE-2024-35202
Bitcoin Core before 25.0 allows remote attackers to cause a denial of service (blocktxn message-handling assertion and node exit) by including transactions in a blocktxn message that are not committed to in a block's merkle root. • https://bitcoincore.org/en/2024/10/08/disclose-blocktxn-crash https://en.bitcoin.it/wiki/Common_Vulnerabilities_and_Exposures https://github.com/bitcoin/bitcoin/blob/master/doc/release-notes/release-notes-25.0.md https://github.com/bitcoin/bitcoin/pull/26898 https://github.com/bitcoin/bitcoin/releases/tag/v25.0 • CWE-770: Allocation of Resources Without Limits or Throttling •
CVE-2024-39525 – Junos OS and Junos OS Evolved: When BGP traceoptions is enabled, receipt of specially crafted BGP packet causes RPD crash
https://notcve.org/view.php?id=CVE-2024-39525
An Improper Handling of Exceptional Conditions vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated network-based attacker sending a specific BGP packet to cause rpd to crash and restart, resulting in a Denial of Service (DoS). Continued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition. This issue only affects systems with BGP traceoptions enabled and requires a BGP session to be already established. • https://supportportal.juniper.net/JSA88102 https://www.juniper.net/documentation/us/en/software/junos/cli-reference/topics/ref/statement/traceoptions-edit-protocols-bgp.html • CWE-755: Improper Handling of Exceptional Conditions •
CVE-2024-39516 – Junos OS and Junos OS Evolved: With certain BGP options enabled, receipt of specifically malformed BGP update causes RPD crash
https://notcve.org/view.php?id=CVE-2024-39516
An Out-of-Bounds Read vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated network-based attacker sending a specifically malformed BGP packet to cause rpd to crash and restart, resulting in a Denial of Service (DoS). Continued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition. This issue only affects systems with BGP traceoptions enabled. ... An Out-of-Bounds Read vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated network-based attacker sending a specifically malformed BGP packet to cause rpd to crash and restart, resulting in a Denial of Service (DoS). Continued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition. This issue only affects systems configured in either of two ways: * systems with BGP traceoptions enabled * systems with BGP traffic engineering configured This issue can affect iBGP and eBGP with any address family configured. • https://supportportal.juniper.net/JSA88100 https://www.juniper.net/documentation/us/en/software/junos/cli-reference/topics/ref/statement/traceoptions-edit-protocols-bgp.html • CWE-125: Out-of-bounds Read •