Page 83 of 533 results (0.013 seconds)

CVSS: 4.3EPSS: 1%CPEs: 25EXPL: 2

The dissect_dcm_main function in epan/dissectors/packet-dcm.c in the DICOM dissector in Wireshark 1.2.x before 1.2.17 and 1.4.x before 1.4.7 allows remote attackers to cause a denial of service (infinite loop) via an invalid PDU length. La función dissect_dcm_main en epan/dissectors/packet_dcm.c en el disector de DICOM en Wireshark v1.2.x antes de v1.2.17 y v1.4.x antes de v1.4.7 permite a atacantes remotos provocar una denegación de servicio ( bucle infinito ) a través de una longitud de la PDU invalida. • http://anonsvn.wireshark.org/viewvc?view=revision&revision=36958 http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061290.html http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061437.html http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061477.html http://openwall.com/lists/oss-security/2011/05/31/20 http://openwall.com/lists/oss-security/2011/06/01/1 http://openwall.com/lists/oss-security/2011/06/01/11 http://secunia.com/adviso • CWE-399: Resource Management Errors CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') •

CVSS: 4.3EPSS: 0%CPEs: 25EXPL: 2

The snoop_read function in wiretap/snoop.c in Wireshark 1.2.x before 1.2.17 and 1.4.x before 1.4.7 does not properly handle certain virtualizable buffers, which allows remote attackers to cause a denial of service (application crash) via a large length value in a snoop file that triggers a stack-based buffer over-read. La función snoop_read en wiretap/snoop.c de Wireshark v1.2.x antes de v1.2.17 y v1.4.x antes de v1.4.7 no maneja adecuadamente ciertos búfers virtualizables, que permite a atacantes remotos provocar una denegación de servicio ( caída de aplicación) a través de un valor de longitud grande en un archivo de Snoop que desencadena un búfer una sobre-lectura en la pila del búfer. • http://anonsvn.wireshark.org/viewvc?view=revision&revision=37068 http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061290.html http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061437.html http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061477.html http://openwall.com/lists/oss-security/2011/05/31/20 http://openwall.com/lists/oss-security/2011/06/01/1 http://openwall.com/lists/oss-security/2011/06/01/11 http://rhn.redhat.com/ • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 4.3EPSS: 1%CPEs: 1EXPL: 4

The bytes_repr_len function in Wireshark 1.4.5 uses an incorrect pointer argument, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via arbitrary TCP traffic. Función bytes_repr_len en Wireshark v1.4.5 utiliza un argumento de puntero incorrecto, lo que permite a atacantes remotos provocar una denegación de servicio ( desreferenciar punteros nulos y bloqueo de la aplicación ) a través tráfico TCP arbitrario. • https://www.exploit-db.com/exploits/35873 http://openwall.com/lists/oss-security/2011/05/31/19 http://openwall.com/lists/oss-security/2011/06/01/9 http://secunia.com/advisories/44449 http://www.wireshark.org/docs/relnotes/wireshark-1.4.6.html http://www.wireshark.org/news/20110418.html https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5837 https://exchange.xforce.ibmcloud.com/vulnerabilities/67789 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre& •

CVSS: 4.3EPSS: 0%CPEs: 25EXPL: 0

Wireshark 1.2.x before 1.2.17 and 1.4.x before 1.4.7 allows user-assisted remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted Diameter dictionary file. Wireshark v1.2.x antes de v1.2.17 y v1.4.x antes de v1.4.7 permite a atacantes remotos asistidos por el usuario provocar una denegación de servicio ( desreferenciar puntero NULO y bloqueo de la aplicación ) a través de un archivo de diccionario manipulado. • http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061290.html http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061437.html http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061477.html http://openwall.com/lists/oss-security/2011/05/31/20 http://openwall.com/lists/oss-security/2011/06/01/1 http://openwall.com/lists/oss-security/2011/06/01/11 http://rhn.redhat.com/errata/RHSA-2013-0125.html http://secunia.com/advisories/44449 • CWE-476: NULL Pointer Dereference •

CVSS: 4.3EPSS: 0%CPEs: 25EXPL: 1

Double free vulnerability in the tvb_uncompress function in epan/tvbuff.c in Wireshark 1.2.x before 1.2.17 and 1.4.x before 1.4.7 allows remote attackers to cause a denial of service (application crash) via a packet with malformed data that uses zlib compression. Doble vulnerabilidad libre en la función tvb_uncompress en epan/tvbuff.c en Wireshark v1.2.x con anterioridad a v1.2.17 y v1.4.x con anterioridad a v1.4.7permite a atacantes remotos provocar una denegación de servicio ( caída de la aplicación) a través de un paquete con de datos con formato incorrecto que utiliza la compresión zlib. • http://anonsvn.wireshark.org/viewvc?view=revision&revision=37081 http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061290.html http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061437.html http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061477.html http://openwall.com/lists/oss-security/2011/05/31/20 http://openwall.com/lists/oss-security/2011/06/01/1 http://openwall.com/lists/oss-security/2011/06/01/11 http://secunia.com/adviso • CWE-399: Resource Management Errors •