CVE-2011-1592
https://notcve.org/view.php?id=CVE-2011-1592
The NFS dissector in epan/dissectors/packet-nfs.c in Wireshark 1.4.x before 1.4.5 on Windows uses an incorrect integer data type during decoding of SETCLIENTID calls, which allows remote attackers to cause a denial of service (application crash) via a crafted .pcap file. El disector de NFS en epan/dissectors/packet-nfs.c en Wireshark v1.4.x antes de v1.4.5 en Windows utiliza un tipo de dato entero incorrecto durante la decodificación de las llamadas SETCLIENTID, lo que permite a atacantes remotos provocar una denegación de servicio (por caída de la aplicación) a través de un archivo pcap debidamente modificado. • http://anonsvn.wireshark.org/viewvc?revision=34115&view=revision http://openwall.com/lists/oss-security/2011/04/18/2 http://openwall.com/lists/oss-security/2011/04/18/8 http://secunia.com/advisories/44172 http://www.mandriva.com/security/advisories?name=MDVSA-2011:083 http://www.osvdb.org/71847 http://www.vupen.com/english/advisories/2011/1022 http://www.wireshark.org/security/wnpa-sec-2011-06.html https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5209 https:/& • CWE-189: Numeric Errors •
CVE-2011-1591 – Wireshark 1.4.4 - DECT Dissector Remote Buffer Overflow
https://notcve.org/view.php?id=CVE-2011-1591
Stack-based buffer overflow in the DECT dissector in epan/dissectors/packet-dect.c in Wireshark 1.4.x before 1.4.5 allows remote attackers to execute arbitrary code via a crafted .pcap file. Desbordamiento de búfer basado en pila en el disector DECT en epan/dissectors/packet-dect.c en Wireshark v1.4.x antes de v1.4.5 permite a atacantes remotos ejecutar código arbitrario mediante un archivo pcap debidamente modificado. • https://www.exploit-db.com/exploits/18145 https://www.exploit-db.com/exploits/17186 https://www.exploit-db.com/exploits/17185 https://www.exploit-db.com/exploits/17195 http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058900.html http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058983.html http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058993.html http://openwall.com/lists/oss-security/2011/04/18/2 http://openwall.com/list • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2011-0024 – wireshark: heap-based buffer overflow in wireshark < 1.2 when reading malformed capture files
https://notcve.org/view.php?id=CVE-2011-0024
Heap-based buffer overflow in wiretap/pcapng.c in Wireshark before 1.2 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted capture file. Desbordamiento de búfer basado en memoria dinámica en wiretap/pcapng.c de Wireshark en versiones anteriores a v1.2,permite a atacantes remotos causar una denegación de servicio (cuelgue) o ejecutar código arbitrario a través de un fichero de capturas de tráfico manipulado. • http://secunia.com/advisories/43821 http://www.redhat.com/support/errata/RHSA-2011-0370.html http://www.vupen.com/english/advisories/2011/0719 https://bugzilla.redhat.com/show_bug.cgi?id=671331 https://access.redhat.com/security/cve/CVE-2011-0024 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-122: Heap-based Buffer Overflow •
CVE-2011-1139 – Wireshark: Denial Of Service (application crash) via a pcap-ng file that contains a large packet-length field
https://notcve.org/view.php?id=CVE-2011-1139
wiretap/pcapng.c in Wireshark 1.2.0 through 1.2.14 and 1.4.0 through 1.4.3 allows remote attackers to cause a denial of service (application crash) via a pcap-ng file that contains a large packet-length field. wiretap/pcapng.c de Wireshark 1.2.0 hasta la versión 1.2.14 y 1.4.0 hasta la 1.4.3 permite a atacantes remotos provocar una denegación de servicio (caída de la aplicación) a través de un fichero pcap-ng que contenga un campo packet-length extenso. • http://anonsvn.wireshark.org/viewvc?view=rev&revision=35855 http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055364.html http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055650.html http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055664.html http://secunia.com/advisories/43759 http://secunia.com/advisories/43795 http://secunia.com/advisories/43821 http://secunia.com/advisories/44169 http://www.debian.org/security/2011/dsa-2201 http:/ • CWE-399: Resource Management Errors •
CVE-2011-0713 – Wireshark: heap-based buffer overflow when reading malformed Nokia DCT3 phone signalling traces
https://notcve.org/view.php?id=CVE-2011-0713
Heap-based buffer overflow in wiretap/dct3trace.c in Wireshark 1.2.0 through 1.2.14 and 1.4.0 through 1.4.3 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a long record in a Nokia DCT3 trace file. Desobordamiento de buffer en memoria dinámica en wiretap/dct3trace.c de Wireshark 1.2.0 hasta la versión 1.2.14 y 1.4.0 hasta la 1.4.3. Permite a atacantes remotos provocar una denegación de servicio (caída de la aplicación) o posiblemente tener otro impacto sin especificar a través de un registro extenso de un fichero de trazás Nokia DCT3. • http://anonsvn.wireshark.org/viewvc?view=rev&revision=35953 http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055364.html http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055650.html http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055664.html http://openwall.com/lists/oss-security/2011/02/16/13 http://secunia.com/advisories/43759 http://secunia.com/advisories/43795 http://www.debian.org/security/2011/dsa-2201 http://www.kb.cert& • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-122: Heap-based Buffer Overflow •