Download
| Alert*
oval:org.secpod.oval:def:600931
Bjorn Mork and Laurent Butti discovered crashes in the PPP and RTPS2 dissectors, which could potentially result in the execution of arbitrary code. oval:org.secpod.oval:def:6298 The host is installed with Wireshark 1.4.x before 1.4.13 or 1.6.x before 1.6.8 and is prone to multiple integer underflow vulnerabilities. The flaws are present in the application, which fails to handle vectors related to the R3 dissector. Successful exploitation allows remote attackers to cause a d ... oval:org.secpod.oval:def:6294 The host is installed with Wireshark 1.4.x before 1.4.13 or 1.6.x before 1.6.8 and is prone to multiple integer underflow vulnerabilities. The flaws are present in the application, which fails to handle vectors related to the R3 dissector. Successful exploitation allows remote attackers to cause a d ... oval:org.secpod.oval:def:6300 The host is installed with Wireshark 1.4.x before 1.4.13 and 1.6.x before 1.6.8 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly construct certain array data structures. Successful exploitation allows remote attackers to cause application ... oval:org.secpod.oval:def:6296 The host is installed with Wireshark 1.4.x before 1.4.13 and 1.6.x before 1.6.8 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly construct certain array data structures. Successful exploitation allows remote attackers to cause application ... oval:org.secpod.oval:def:6419 The host is installed with Wireshark 1.4.x before 1.4.14 or 1.6.x before 1.6.9 or 1.8.x before 1.8.1 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle the PPP dissector. Successful exploitation allows remote attackers to cause a denial of se ... oval:org.secpod.oval:def:6417 The host is installed with Wireshark 1.4.x before 1.4.14 or 1.6.x before 1.6.9 or 1.8.x before 1.8.1 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle the PPP dissector. Successful exploitation allows remote attackers to cause a denial of se ... oval:org.secpod.oval:def:6420 The host is installed with Wireshark 1.4.x before 1.4.14 or 1.6.x before 1.6.9 or 1.8.x before 1.8.1 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle the epan/dissectors/packet-nfs.c in the NFS dissector. Successful exploitation allows remo ... oval:org.secpod.oval:def:6418 The host is installed with Wireshark 1.4.x before 1.4.14 or 1.6.x before 1.6.9 or 1.8.x before 1.8.1 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle the epan/dissectors/packet-nfs.c in the NFS dissector. Successful exploitation allows remo ... oval:org.secpod.oval:def:6768 The host is installed with Wireshark 1.4.x before 1.4.15 or 1.6.x before 1.6.10 or 1.8.x before 1.8.2 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle the dissect_pft function in epan/dissectors/packet-dcp-etsi.c in the DCP ETSI dissector. ... oval:org.secpod.oval:def:6906 The host is installed with Wireshark 1.4.x before 1.4.15 or 1.6.x before 1.6.10 or 1.8.x before 1.8.2 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle the dissect_pft function in epan/dissectors/packet-dcp-etsi.c in the DCP ETSI dissector. ... oval:org.secpod.oval:def:1500080 Updated wireshark packages that fix several security issues, three bugs,and add one enhancement are now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having moderatesecurity impact. Common Vulnerability Scoring System base scores,which give de ... oval:org.secpod.oval:def:501147 Wireshark, previously known as Ethereal, is a network protocol analyzer. It is used to capture and browse the traffic running on a computer network. Two flaws were found in Wireshark. If Wireshark read a malformed packet off a network or opened a malicious dump file, it could crash or, possibly, exe ... oval:org.secpod.oval:def:500936 Wireshark, previously known as Ethereal, is a network protocol analyzer. It is used to capture and browse the traffic running on a computer network. A heap-based buffer overflow flaw was found in the way Wireshark handled Endace ERF capture files. If Wireshark opened a specially-crafted ERF capture ... oval:org.secpod.oval:def:6774 The host is installed with Wireshark 1.4.x before 1.4.15 or 1.6.x before 1.6.10 or 1.8.x before 1.8.2 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle the CIP dissector. Successful exploitation allows remote attackers to cause a denial of s ... oval:org.secpod.oval:def:6773 The host is installed with Wireshark 1.4.x before 1.4.15 or 1.6.x before 1.6.10 or 1.8.x before 1.8.2 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle the CTDB dissector. Successful exploitation allows remote attackers to cause a denial of ... oval:org.secpod.oval:def:6772 The host is installed with Wireshark 1.4.x before 1.4.15 or 1.6.x before 1.6.10 or 1.8.x before 1.8.2 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle a large number of ACL entries. Successful exploitation allows remote attackers to cause a ... oval:org.secpod.oval:def:6910 The host is installed with Wireshark 1.4.x before 1.4.15 or 1.6.x before 1.6.10 or 1.8.x before 1.8.2 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle the CTDB dissector. Successful exploitation allows remote attackers to cause a denial of ... oval:org.secpod.oval:def:6776 The host is installed with Wireshark 1.4.x before 1.4.15 or 1.6.x before 1.6.10 or 1.8.x before 1.8.2 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle certain integer fields. Successful exploitation allows remote attackers to cause ... oval:org.secpod.oval:def:6913 The host is installed with Wireshark 1.4.x before 1.4.15 or 1.6.x before 1.6.10 or 1.8.x before 1.8.2 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle certain integer fields. Successful exploitation allows remote attackers to cause ... oval:org.secpod.oval:def:6779 The host is installed with Wireshark 1.4.x before 1.4.15 or 1.6.x before 1.6.10 or 1.8.x before 1.8.2 and is prone to buffer overflow vulnerability. A flaw is present in the application, which fails to handle the epan/dissectors/packet-rtps2.c in the RTPS2 dissector. Successful exploitation allows r ... oval:org.secpod.oval:def:6911 The host is installed with Wireshark 1.4.x before 1.4.15 or 1.6.x before 1.6.10 or 1.8.x before 1.8.2 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle the CIP dissector. Successful exploitation allows remote attackers to cause a denial of s ... oval:org.secpod.oval:def:6916 The host is installed with Wireshark 1.4.x before 1.4.15 or 1.6.x before 1.6.10 or 1.8.x before 1.8.2 and is prone to buffer overflow vulnerability. A flaw is present in the application, which fails to handle the epan/dissectors/packet-rtps2.c in the RTPS2 dissector. Successful exploitation allows r ... oval:org.secpod.oval:def:6909 The host is installed with Wireshark 1.4.x before 1.4.15 or 1.6.x before 1.6.10 or 1.8.x before 1.8.2 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle the epan/dissectors/packet-afp.c in the AFP dissector. Successful exploitation allows rem ... oval:org.secpod.oval:def:202528 Wireshark, previously known as Ethereal, is a network protocol analyzer. It is used to capture and browse the traffic running on a computer network. A heap-based buffer overflow flaw was found in the way Wireshark handled Endace ERF capture files. If Wireshark opened a specially-crafted ERF capture ... oval:org.secpod.oval:def:6301 The host is installed with Wireshark 1.4.x before 1.4.13 and 1.6.x before 1.6.8 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle vectors related to the ANSI MAP, ASF, IEEE 802.11, IEEE 802.3 and LTP dissectors. Successful exploitation allow ... oval:org.secpod.oval:def:6299 The host is installed with Wireshark 1.4.x before 1.4.13 and 1.6.x before 1.6.8 and is prone to multiple integer overflow vulnerabilities. The flaws are present in the application, which fails to handle vectors related to the BACapp and Bluetooth HCI dissectors. Successful exploitation allows remote ... oval:org.secpod.oval:def:6771 The host is installed with Wireshark 1.4.x before 1.4.15 or 1.6.x before 1.6.10 or 1.8.x before 1.8.2 and is prone to integer overflow vulnerability. A flaw is present in the application, which fails to handle the dissect_xtp_ecntl function in epan/dissectors/packet-xtp.c in the XTP dissector. Succe ... oval:org.secpod.oval:def:1600294 Two flaws were found in Wireshark. If Wireshark read a malformed packet off a network or opened a malicious dump file, it could crash or, possibly, execute arbitrary code as the user running Wireshark. Several denial of service flaws were found in Wireshark. Wireshark could crash or stop responding ... oval:org.secpod.oval:def:6775 The host is installed with Wireshark 1.4.x before 1.4.15 or 1.6.x before 1.6.10 or 1.8.x before 1.8.2 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle the dissect_stun_message function in epan/dissectors/packet-stun.c in the STUN dissector. ... oval:org.secpod.oval:def:6912 The host is installed with Wireshark 1.4.x before 1.4.15 or 1.6.x before 1.6.10 or 1.8.x before 1.8.2 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle the dissect_stun_message function in epan/dissectors/packet-stun.c in the STUN dissector. ... oval:org.secpod.oval:def:6908 The host is installed with Wireshark 1.4.x before 1.4.15 or 1.6.x before 1.6.10 or 1.8.x before 1.8.2 and is prone to integer overflow vulnerability. A flaw is present in the application, which fails to handle the dissect_xtp_ecntl function in epan/dissectors/packet-xtp.c in the XTP dissector. Succe ... oval:org.secpod.oval:def:6297 The host is installed with Wireshark 1.4.x before 1.4.13 and 1.6.x before 1.6.8 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle vectors related to the ANSI MAP, ASF, IEEE 802.11, IEEE 802.3 and LTP dissectors. Successful exploitation allow ... oval:org.secpod.oval:def:6295 The host is installed with Wireshark 1.4.x before 1.4.13 and 1.6.x before 1.6.8 and is prone to multiple integer overflow vulnerabilities. The flaws are present in the application, which fails to handle vectors related to the BACapp and Bluetooth HCI dissectors. Successful exploitation allows remote ... |