Page 81 of 533 results (0.012 seconds)

CVSS: 4.4EPSS: 0%CPEs: 13EXPL: 0

Heap-based buffer overflow in the erf_read_header function in wiretap/erf.c in the ERF file parser in Wireshark 1.4.0 through 1.4.9 and 1.6.x before 1.6.3 allows remote attackers to cause a denial of service (application crash) via a malformed file. Desbordamiento de buffer de memoria dinámica en en la función erf_read_header en wiretap/erf.c en el analizador de archivos ERF en Wireshark v1.4.0, v1.4.9 y v1.6.x anterior a v1.6.3 permite a atacantes remotos provocar una denegación de servicio (caída de aplicación) a través de un archivo con formato incorrecto. • http://anonsvn.wireshark.org/viewvc?view=revision&revision=39508 http://openwall.com/lists/oss-security/2011/11/01/9 http://osvdb.org/76770 http://rhn.redhat.com/errata/RHSA-2013-0125.html http://secunia.com/advisories/46644 http://secunia.com/advisories/46913 http://secunia.com/advisories/48947 http://www.securityfocus.com/bid/50486 http://www.wireshark.org/security/wnpa-sec-2011-19.html https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6479 https://bugzilla.re • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 4.3EPSS: 0%CPEs: 13EXPL: 0

The dissect_infiniband_common function in epan/dissectors/packet-infiniband.c in the Infiniband dissector in Wireshark 1.4.0 through 1.4.9 and 1.6.x before 1.6.3 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a malformed packet. La función dissect_infiniband_common en epan/dissectors/packet-infiniband.c en el Infiniband dissector en Wireshark v1.4.0 v1.4.9 y a través de v1.6.x y anterior a v1.6.3 permite a atacantes remotos provocar una denegación de servicio (puntero a NULL y caída de la aplicación ) a través de un paquete con formato erróneo. • http://anonsvn.wireshark.org/viewvc?view=revision&revision=39500 http://openwall.com/lists/oss-security/2011/11/01/9 http://osvdb.org/76769 http://secunia.com/advisories/46644 http://www.securityfocus.com/bid/50481 http://www.wireshark.org/security/wnpa-sec-2011-18.html https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6476 https://bugzilla.redhat.com/show_bug.cgi?id=750645 https://exchange.xforce.ibmcloud.com/vulnerabilities/71091 https://oval.cisecurity.org/repository/se •

CVSS: 4.3EPSS: 0%CPEs: 3EXPL: 0

The csnStreamDissector function in epan/dissectors/packet-csn1.c in the CSN.1 dissector in Wireshark 1.6.x before 1.6.3 does not initialize a certain variable, which allows remote attackers to cause a denial of service (application crash) via a malformed packet. La función csnStreamDissector en epan/dissectors/packet-csn1.c en el CSN.1 dissector en Wireshark v1.6.x anterior a v1.6.3 no inicializa una determinada variable, que permite a atacantes remotos provocar una denegación de servicio (caída de aplicación) a través de un paquete con formato erróneo. • http://anonsvn.wireshark.org/viewvc?view=revision&revision=39140 http://openwall.com/lists/oss-security/2011/11/01/9 http://osvdb.org/76768 http://secunia.com/advisories/46644 http://www.securityfocus.com/bid/50479 http://www.wireshark.org/security/wnpa-sec-2011-17.html https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6351 https://bugzilla.redhat.com/show_bug.cgi?id=750643 https://exchange.xforce.ibmcloud.com/vulnerabilities/71090 https://oval.cisecurity.org/repository/se • CWE-399: Resource Management Errors •

CVSS: 4.3EPSS: 0%CPEs: 2EXPL: 1

The unxorFrame function in epan/dissectors/packet-opensafety.c in the OpenSafety dissector in Wireshark 1.6.x before 1.6.2 does not properly validate a certain frame size, which allows remote attackers to cause a denial of service (loop and application crash) via a malformed packet. La función unxorFrame en epan/dissectors/packet-opensafety.c en el disector OpenSafety en Wireshark v1.6.x antes de la v1.6.2 no valida correctamente el tamaño de un cierto marco, lo que permite a atacantes remotos causar una denegación de servicio (caída del bucle y la aplicación ) a través de un paquete con formato erróneo. • http://anonsvn.wireshark.org/viewvc?view=revision&revision=38213 http://www.mandriva.com/security/advisories?name=MDVSA-2011:138 http://www.openwall.com/lists/oss-security/2011/09/13/1 http://www.openwall.com/lists/oss-security/2011/09/14/10 http://www.openwall.com/lists/oss-security/2011/09/14/5 http://www.openwall.com/lists/oss-security/2011/09/14/9 http://www.wireshark.org/security/wnpa-sec-2011-12.html https://bugs.wireshark.org/bugzilla/show_bug.cgi?id= • CWE-20: Improper Input Validation •

CVSS: 4.3EPSS: 0%CPEs: 2EXPL: 2

The csnStreamDissector function in epan/dissectors/packet-csn1.c in the CSN.1 dissector in Wireshark 1.6.x before 1.6.2 does not initialize a certain structure member, which allows remote attackers to cause a denial of service (application crash) via a malformed packet. La función csnStreamDissector en epan/dissectors/packet-csn1.c en el disector CSN.1 en Wireshark v1.6.x antes de la v1.6.2 no inicializa un miembro de cierta estructura, que permite a atacantes remotos provocar una denegación de servicio (caída de aplicación) a través de un paquete con formato erróneo. • http://anonsvn.wireshark.org/viewvc?view=revision&revision=38430 http://www.mandriva.com/security/advisories?name=MDVSA-2011:138 http://www.openwall.com/lists/oss-security/2011/09/13/1 http://www.openwall.com/lists/oss-security/2011/09/14/10 http://www.openwall.com/lists/oss-security/2011/09/14/5 http://www.openwall.com/lists/oss-security/2011/09/14/9 http://www.wireshark.org/security/wnpa-sec-2011-16.html https://bugs.wireshark.org/bugzilla/show_bug.cgi?id= • CWE-399: Resource Management Errors •