CVE-2007-3393 – Wireshark corrupts the stack when inspecting BOOTP traffic
https://notcve.org/view.php?id=CVE-2007-3393
Off-by-one error in the DHCP/BOOTP dissector in Wireshark before 0.99.6 allows remote attackers to cause a denial of service (crash) via crafted DHCP-over-DOCSIS packets. Error de superación de límite (off-by-one) en el disector DHCP/BOOTP de Wireshark anterior a 0.99.6 permite a atacantes remotos provocar una denegación de servicio (caída) mediante paquetes DHCP-over-DOCSIS manipulados de forma artesanal. • http://osvdb.org/37639 http://secunia.com/advisories/22588 http://secunia.com/advisories/25833 http://secunia.com/advisories/25877 http://secunia.com/advisories/25987 http://secunia.com/advisories/26004 http://secunia.com/advisories/26499 http://secunia.com/advisories/28583 http://security.gentoo.org/glsa/glsa-200708-12.xml http://www.debian.org/security/2007/dsa-1322 http://www.mandriva.com/security/advisories?name=MDKSA-2007:145 http://www.novell.com/linux/security& •
CVE-2006-5595
https://notcve.org/view.php?id=CVE-2006-5595
Unspecified vulnerability in the AirPcap support in Wireshark (formerly Ethereal) 0.99.3 has unspecified attack vectors related to WEP key parsing. Vulnerabilidad sin especificar en el soporte AirPcap en Wireshark (anteriormente conocido como Ethereal) 0.99.3 tiene vectores de ataque sin especificar referido al analizador sintáctico WEP. • http://secunia.com/advisories/22590 http://www.securityfocus.com/bid/20762 http://www.wireshark.org/security/wnpa-sec-2006-03.html https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14787 •
CVE-2006-5469
https://notcve.org/view.php?id=CVE-2006-5469
Unspecified vulnerability in the WBXML dissector in Wireshark (formerly Ethereal) 0.10.11 through 0.99.3 allows remote attackers to cause a denial of service (crash) via certain vectors that trigger a null dereference. Vulnerabilidad sin especificar en el diseccionador WBXML (antiguamente Ethereal)desde la versión 0.10.11 hasta la 0.99.3., permite a atacantes remotos causar la denegación de servicio (caída) mediante determinados vectores que disparen referencias nulas. • ftp://patches.sgi.com/support/free/security/advisories/20061101-01-P http://secunia.com/advisories/22590 http://secunia.com/advisories/22672 http://secunia.com/advisories/22692 http://secunia.com/advisories/22797 http://secunia.com/advisories/22841 http://secunia.com/advisories/22929 http://secunia.com/advisories/23096 http://securitytracker.com/id?1017129 http://support.avaya.com/elmodocs2/security/ASA-2006-255.htm http://www.mandriva.com/security/advisories?name=MDKSA-2006:195 •
CVE-2006-4574
https://notcve.org/view.php?id=CVE-2006-4574
Off-by-one error in the MIME Multipart dissector in Wireshark (formerly Ethereal) 0.10.1 through 0.99.3 allows remote attackers to cause a denial of service (crash) via certain vectors that trigger an assertion error related to unexpected length values. Error por un paso en el disector MIME Multipart en Wireshark (anteriormente Ethereal) desde la versión 0.10.1 hasta la 0.99.3 permite que atacantes remotos provoquen una denegación de servicio (cierre inesperado) mediante determinados vectores que desencadenan un error de aserción relacionado con valores de longitud inesperados. • ftp://patches.sgi.com/support/free/security/advisories/20061101-01-P http://secunia.com/advisories/22590 http://secunia.com/advisories/22659 http://secunia.com/advisories/22672 http://secunia.com/advisories/22692 http://secunia.com/advisories/22797 http://secunia.com/advisories/22841 http://secunia.com/advisories/22929 http://secunia.com/advisories/23096 http://securitytracker.com/id?1017129 http://support.avaya.com/elmodocs2/security/ASA-2006-255.htm http://www.mandriva.com • CWE-193: Off-by-one Error CWE-617: Reachable Assertion •
CVE-2006-4805
https://notcve.org/view.php?id=CVE-2006-4805
epan/dissectors/packet-xot.c in the XOT dissector (dissect_xot_pdu) in Wireshark (formerly Ethereal) 0.9.8 through 0.99.3 allows remote attackers to cause a denial of service (memory consumption and crash) via an encoded XOT packet that produces a zero length value when it is decoded. epan/dissectors/packet-xot.c en el separador XOT (dissect_xot_pdu) en Wireshark (antes conocido como Ethereal) 0.9.8 hasta la 0.99.3 permite a un atacante remoto provocar denegación de servicio (consumo de memoria y caida) a través de un paquete XOT codificado que crea un valor de longitud zero cuando está codificado. • ftp://patches.sgi.com/support/free/security/advisories/20061101-01-P http://secunia.com/advisories/22590 http://secunia.com/advisories/22659 http://secunia.com/advisories/22672 http://secunia.com/advisories/22692 http://secunia.com/advisories/22797 http://secunia.com/advisories/22841 http://secunia.com/advisories/22929 http://secunia.com/advisories/23096 http://securitytracker.com/id?1017129 http://support.avaya.com/elmodocs2/security/ASA-2006-255.htm http://www.kb.cert. •