Download
| Alert*
oval:org.secpod.oval:def:501147
Wireshark, previously known as Ethereal, is a network protocol analyzer. It is used to capture and browse the traffic running on a computer network. Two flaws were found in Wireshark. If Wireshark read a malformed packet off a network or opened a malicious dump file, it could crash or, possibly, exe ... oval:org.secpod.oval:def:205748 The advisory is missing the security advisory description. For more information please visit the reference link oval:org.secpod.oval:def:106187 Wireshark is a network traffic analyzer for Unix-ish operating systems. This package lays base for libpcap, a packet capture and filtering library, contains command-line utilities, contains plugins and documentation for wireshark. A graphical user interface is packaged separately to GTK+ package. oval:org.secpod.oval:def:14117 The host is installed with Wireshark 1.6.x before 1.6.16 or 1.8.x before 1.8.8 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly determine when to use a recursive approach. Successful exploitation allows attackers to cause denial of servic ... oval:org.secpod.oval:def:1300200 Multiple vulnerabilities has been found and corrected in wireshark: * The ASN.1 BER dissector could crash . * The CAPWAP dissector could crash . * The HTTP dissector could overrun the stack . * The DCP ETSI dissector could crash . This advisory provides the latest version of Wireshark which is not ... oval:org.secpod.oval:def:105875 Wireshark is a network traffic analyzer for Unix-ish operating systems. This package lays base for libpcap, a packet capture and filtering library, contains command-line utilities, contains plugins and documentation for wireshark. A graphical user interface is packaged separately to GTK+ package. oval:org.secpod.oval:def:14127 The host is installed with Wireshark 1.6.x before 1.6.16 or 1.8.x before 1.8.8 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly determine when to use a recursive approach. Successful exploitation allows attackers to cause denial of servic ... oval:org.secpod.oval:def:1600294 Two flaws were found in Wireshark. If Wireshark read a malformed packet off a network or opened a malicious dump file, it could crash or, possibly, execute arbitrary code as the user running Wireshark. Several denial of service flaws were found in Wireshark. Wireshark could crash or stop responding ... oval:org.secpod.oval:def:203233 Wireshark is a network protocol analyzer. It is used to capture and browse the traffic running on a computer network. Multiple flaws were found in Wireshark. If Wireshark read a malformed packet off a network or opened a malicious dump file, it could crash or, possibly, execute arbitrary code as the ... oval:org.secpod.oval:def:1500299 Updated wireshark packages that fix multiple security issues, several bugs, and add various enhancements are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System base scores, wh ... oval:org.secpod.oval:def:501218 Wireshark is a network protocol analyzer. It is used to capture and browse the traffic running on a computer network. Multiple flaws were found in Wireshark. If Wireshark read a malformed packet off a network or opened a malicious dump file, it could crash or, possibly, execute arbitrary code as the ... oval:org.secpod.oval:def:1500433 Updated wireshark packages that fix multiple security issues are now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having Moderate security impact. Common Vulnerability Scoring System base scores, which give detailed severity ratings, are avai ... oval:org.secpod.oval:def:601055 Multiple vulnerabilities were discovered in the dissectors for CAPWAP, GMR-1 BCCH, PPP, NBAP, RDP, HTTP, DCP ETSI and in the Ixia IxVeriWave file parser, which could result in denial of service or the execution of arbitrary code. |