Page 82 of 536 results (0.027 seconds)

CVSS: 4.3EPSS: 0%CPEs: 3EXPL: 0

The csnStreamDissector function in epan/dissectors/packet-csn1.c in the CSN.1 dissector in Wireshark 1.6.x before 1.6.3 does not initialize a certain variable, which allows remote attackers to cause a denial of service (application crash) via a malformed packet. La función csnStreamDissector en epan/dissectors/packet-csn1.c en el CSN.1 dissector en Wireshark v1.6.x anterior a v1.6.3 no inicializa una determinada variable, que permite a atacantes remotos provocar una denegación de servicio (caída de aplicación) a través de un paquete con formato erróneo. • http://anonsvn.wireshark.org/viewvc?view=revision&revision=39140 http://openwall.com/lists/oss-security/2011/11/01/9 http://osvdb.org/76768 http://secunia.com/advisories/46644 http://www.securityfocus.com/bid/50479 http://www.wireshark.org/security/wnpa-sec-2011-17.html https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6351 https://bugzilla.redhat.com/show_bug.cgi?id=750643 https://exchange.xforce.ibmcloud.com/vulnerabilities/71090 https://oval.cisecurity.org/repository/se • CWE-399: Resource Management Errors •

CVSS: 4.3EPSS: 0%CPEs: 2EXPL: 1

The unxorFrame function in epan/dissectors/packet-opensafety.c in the OpenSafety dissector in Wireshark 1.6.x before 1.6.2 does not properly validate a certain frame size, which allows remote attackers to cause a denial of service (loop and application crash) via a malformed packet. La función unxorFrame en epan/dissectors/packet-opensafety.c en el disector OpenSafety en Wireshark v1.6.x antes de la v1.6.2 no valida correctamente el tamaño de un cierto marco, lo que permite a atacantes remotos causar una denegación de servicio (caída del bucle y la aplicación ) a través de un paquete con formato erróneo. • http://anonsvn.wireshark.org/viewvc?view=revision&revision=38213 http://www.mandriva.com/security/advisories?name=MDVSA-2011:138 http://www.openwall.com/lists/oss-security/2011/09/13/1 http://www.openwall.com/lists/oss-security/2011/09/14/10 http://www.openwall.com/lists/oss-security/2011/09/14/5 http://www.openwall.com/lists/oss-security/2011/09/14/9 http://www.wireshark.org/security/wnpa-sec-2011-12.html https://bugs.wireshark.org/bugzilla/show_bug.cgi?id= • CWE-20: Improper Input Validation •

CVSS: 4.3EPSS: 0%CPEs: 2EXPL: 2

The csnStreamDissector function in epan/dissectors/packet-csn1.c in the CSN.1 dissector in Wireshark 1.6.x before 1.6.2 does not initialize a certain structure member, which allows remote attackers to cause a denial of service (application crash) via a malformed packet. La función csnStreamDissector en epan/dissectors/packet-csn1.c en el disector CSN.1 en Wireshark v1.6.x antes de la v1.6.2 no inicializa un miembro de cierta estructura, que permite a atacantes remotos provocar una denegación de servicio (caída de aplicación) a través de un paquete con formato erróneo. • http://anonsvn.wireshark.org/viewvc?view=revision&revision=38430 http://www.mandriva.com/security/advisories?name=MDVSA-2011:138 http://www.openwall.com/lists/oss-security/2011/09/13/1 http://www.openwall.com/lists/oss-security/2011/09/14/10 http://www.openwall.com/lists/oss-security/2011/09/14/5 http://www.openwall.com/lists/oss-security/2011/09/14/9 http://www.wireshark.org/security/wnpa-sec-2011-16.html https://bugs.wireshark.org/bugzilla/show_bug.cgi?id= • CWE-399: Resource Management Errors •

CVSS: 4.3EPSS: 1%CPEs: 2EXPL: 1

Wireshark 1.6.x before 1.6.2 allows remote attackers to cause a denial of service (application crash) via a malformed capture file that leads to an invalid root tvbuff, related to a "buffer exception handling vulnerability." Wireshark v1.6.x antes de v1.6.2, permite a atacantes remotos causar una denegación de servicio (caída de la aplicación) a través de un archivo de captura modificado que provoca un tvbuff root inválido, relacionado con una "vulnerabilidad de manejo de excepción de búfer" • https://www.exploit-db.com/exploits/36128 http://www.mandriva.com/security/advisories?name=MDVSA-2011:138 http://www.openwall.com/lists/oss-security/2011/09/13/1 http://www.openwall.com/lists/oss-security/2011/09/14/10 http://www.openwall.com/lists/oss-security/2011/09/14/5 http://www.openwall.com/lists/oss-security/2011/09/14/9 http://www.wireshark.org/security/wnpa-sec-2011-14.html https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6135 https:/ • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.3EPSS: 97%CPEs: 11EXPL: 1

Untrusted search path vulnerability in Wireshark 1.4.x before 1.4.9 and 1.6.x before 1.6.2 allows local users to gain privileges via a Trojan horse Lua script in an unspecified directory. La vulnerabilidad de ruta de búsqueda no confiable en Wireshark v1.4.x antes de la v1.4.9 y v1.6.x antes de v1.6.2 permite a usuarios locales conseguir privilegios a través de un troyano en el script Lua en un directorio no especificado. • https://www.exploit-db.com/exploits/18125 http://osvdb.org/75347 http://www.debian.org/security/2011/dsa-2324 http://www.mandriva.com/security/advisories?name=MDVSA-2011:138 http://www.openwall.com/lists/oss-security/2011/09/13/1 http://www.openwall.com/lists/oss-security/2011/09/14/5 http://www.wireshark.org/security/wnpa-sec-2011-15.html https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6136 https://bugzilla.redhat.com/show_bug.cgi?id=737784 https:/ •