CVE-2011-2174 – wireshark: Double-free flaw by uncompressing of a zlib compressed packet
https://notcve.org/view.php?id=CVE-2011-2174
Double free vulnerability in the tvb_uncompress function in epan/tvbuff.c in Wireshark 1.2.x before 1.2.17 and 1.4.x before 1.4.7 allows remote attackers to cause a denial of service (application crash) via a packet with malformed data that uses zlib compression. Doble vulnerabilidad libre en la función tvb_uncompress en epan/tvbuff.c en Wireshark v1.2.x con anterioridad a v1.2.17 y v1.4.x con anterioridad a v1.4.7permite a atacantes remotos provocar una denegación de servicio ( caída de la aplicación) a través de un paquete con de datos con formato incorrecto que utiliza la compresión zlib. • http://anonsvn.wireshark.org/viewvc?view=revision&revision=37081 http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061290.html http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061437.html http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061477.html http://openwall.com/lists/oss-security/2011/05/31/20 http://openwall.com/lists/oss-security/2011/06/01/1 http://openwall.com/lists/oss-security/2011/06/01/11 http://secunia.com/adviso • CWE-399: Resource Management Errors •
CVE-2011-1959 – wireshark: Stack-based buffer over-read from tvbuff buffer when reading snoop capture files
https://notcve.org/view.php?id=CVE-2011-1959
The snoop_read function in wiretap/snoop.c in Wireshark 1.2.x before 1.2.17 and 1.4.x before 1.4.7 does not properly handle certain virtualizable buffers, which allows remote attackers to cause a denial of service (application crash) via a large length value in a snoop file that triggers a stack-based buffer over-read. La función snoop_read en wiretap/snoop.c de Wireshark v1.2.x antes de v1.2.17 y v1.4.x antes de v1.4.7 no maneja adecuadamente ciertos búfers virtualizables, que permite a atacantes remotos provocar una denegación de servicio ( caída de aplicación) a través de un valor de longitud grande en un archivo de Snoop que desencadena un búfer una sobre-lectura en la pila del búfer. • http://anonsvn.wireshark.org/viewvc?view=revision&revision=37068 http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061290.html http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061437.html http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061477.html http://openwall.com/lists/oss-security/2011/05/31/20 http://openwall.com/lists/oss-security/2011/06/01/1 http://openwall.com/lists/oss-security/2011/06/01/11 http://rhn.redhat.com/ • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2011-0538 – Wireshark 1.4.3 - '.pcap' Memory Corruption
https://notcve.org/view.php?id=CVE-2011-0538
Wireshark 1.2.0 through 1.2.14, 1.4.0 through 1.4.3, and 1.5.0 frees an uninitialized pointer during processing of a .pcap file in the pcap-ng format, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a malformed file. Wireshark versiones 1.2.0 hasta 1.2.14, versiones 1.4.0 hasta 1.4.3 y versiones 1.5.0, libera un puntero no inicializado durante el procesamiento de un archivo .pcap en el formato pcap-ng, que permite a los atacantes remotos causar una denegación de servicio (corrupción de memoria) o posiblemente tener otro impacto no especificado por medio de un archivo malformado. • https://www.exploit-db.com/exploits/35314 http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055364.html http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055650.html http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055664.html http://openwall.com/lists/oss-security/2011/02/04/1 http://secunia.com/advisories/43759 http://secunia.com/advisories/43795 http://secunia.com/advisories/43821 http://www.debian.org/security/2011/dsa-2201 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •