67 results (0.009 seconds)

CVSS: 7.5EPSS: 0%CPEs: 45EXPL: 0

23 Nov 2007 — The Bluetooth SDP dissector Wireshark (formerly Ethereal) 0.99.2 to 0.99.6 allows remote attackers to cause a denial of service (infinite loop) via unknown vectors. El Bluetooth SDP dissector Wireshark (formalmente Ethereal), desde la versión 0.99.2 a la 0.99.6, permite que atacantes remotos provoquen una denegación de servicio(por bucle infinito) usando vectores desconocidos. • http://bugs.gentoo.org/show_bug.cgi?id=199958 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.5EPSS: 0%CPEs: 69EXPL: 0

23 Nov 2007 — Multiple unspecified vulnerabilities in Wireshark (formerly Ethereal) allow remote attackers to cause a denial of service (crash) via (1) a crafted MP3 file or (2) unspecified vectors to the NCP dissector. Múltiples vulnerabilidades no especificadas en Wireshark (formalmente Ethereal) que permiten que atacantes remotos provoquen una denegación de servicio (por caída) usando: (1) un fichero MP3 manipulado, o (2) vectores no especificados en el NCP dissector. • http://bugs.gentoo.org/show_bug.cgi?id=199958 •

CVSS: 7.5EPSS: 1%CPEs: 53EXPL: 0

23 Nov 2007 — Wireshark (formerly Ethereal) 0.8.16 to 0.99.6 allows remote attackers to cause a denial of service (crash) via a malformed RPC Portmap packet. Wireshark (formalmente Ethereal), desde la versión 0.8.16 a la 0.99.6, permite que atacantes remotos provoquen una denegación de servicio (por caída) usando paquetes RPC Portmap mal formados. • http://bugs.gentoo.org/show_bug.cgi?id=199958 • CWE-20: Improper Input Validation •

CVSS: 10.0EPSS: 4%CPEs: 41EXPL: 0

18 Jul 2006 — Buffer overflow in Wireshark (aka Ethereal) 0.8.16 to 0.99.0 allows remote attackers to cause a denial of service and possibly execute arbitrary code via the NFS dissector. Desbordamiento de búfer en Wireshark (también conocido como Ethereal) 0.8.16 hasta 0.99.0 permite a atacantes remotos provocar una denegación de servicio y posiblemente ejecutar código de su elección a través del analizador de protocolo NFS. • ftp://patches.sgi.com/support/free/security/advisories/20060801-01-P • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.5EPSS: 2%CPEs: 35EXPL: 0

25 Apr 2006 — Multiple unspecified vulnerabilities in Ethereal 0.9.x up to 0.10.14 allow remote attackers to cause a denial of service (crash from null dereference) via (1) an invalid display filter, or the (2) GSM SMS, (3) ASN.1-based, (4) DCERPC NT, (5) PER, (6) RPC, (7) DCERPC, and (8) ASN.1 dissectors. • ftp://patches.sgi.com/support/free/security/advisories/20060501-01-U.asc •

CVSS: 7.5EPSS: 1%CPEs: 53EXPL: 0

25 Apr 2006 — Multiple unspecified vulnerabilities in Ethereal 0.8.x up to 0.10.14 allow remote attackers to cause a denial of service (crash from null dereference) via the (1) Sniffer capture or (2) SMB PIPE dissector. • ftp://patches.sgi.com/support/free/security/advisories/20060501-01-U.asc •

CVSS: 9.8EPSS: 3%CPEs: 39EXPL: 0

10 Dec 2005 — Stack-based buffer overflow in the dissect_ospf_v3_address_prefix function in the OSPF protocol dissector in Ethereal 0.10.12, and possibly other versions, allows remote attackers to execute arbitrary code via crafted packets. • ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U •

CVSS: 7.5EPSS: 0%CPEs: 39EXPL: 0

01 Nov 2005 — The IRC protocol dissector in Ethereal 0.10.13 allows remote attackers to cause a denial of service (infinite loop). • ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U •

CVSS: 7.5EPSS: 1%CPEs: 32EXPL: 0

27 Oct 2005 — Multiple vulnerabilities in Ethereal 0.10.12 and earlier allow remote attackers to cause a denial of service (memory consumption) via unspecified vectors in the (1) ISAKMP, (2) FC-FCS, (3) RSVP, and (4) ISIS LSP dissector. • http://secunia.com/advisories/17254 •

CVSS: 10.0EPSS: 5%CPEs: 1EXPL: 0

20 Oct 2005 — Buffer overflow vulnerability in the unicode_to_bytes in the Service Location Protocol (srvloc) dissector (packet-srvloc.c) in Ethereal allows remote attackers to execute arbitrary code via a srvloc packet with a modified length value. • http://secunia.com/advisories/17254 •