[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250053

 
 

909

 
 

195940

 
 

282

Paid content will be excluded from the download.


Download | Alert*


oval:org.secpod.oval:def:2186
The host is installed with Wireshark 1.6.1 and is prone to a denial of service vulnerability. A flaw is present in an application, which fails to validate the IKE packet. Successful exploitation could allow attackers to crash the application.

oval:org.secpod.oval:def:2508
The host is installed with Wireshark 1.4.x before 1.4.9 or 1.6.x before 1.6.2 and is prone to an Untrusted search path vulnerability. A flaw is present in the application, which fails to prevent local users from gaining privileges. Successful exploitation could allow attackers to run arbitrary Lua s ...

oval:org.secpod.oval:def:600692
The Microsoft Vulnerability Research group discovered that insecure load path handling could lead to execution of arbitrary Lua script code.

oval:org.secpod.oval:def:600931
Bjorn Mork and Laurent Butti discovered crashes in the PPP and RTPS2 dissectors, which could potentially result in the execution of arbitrary code.

oval:org.secpod.oval:def:2184
The host is installed with Wireshark 1.6.1 and is prone to a denial of service vulnerability. A flaw is present in an application, which fails to validate the IKE packet. Successful exploitation could allow attackers to crash the application.

oval:org.secpod.oval:def:2504
The host is installed with Wireshark 1.4.x before 1.4.9 or 1.6.x before 1.6.2 and is prone to an Untrusted search path vulnerability. A flaw is present in the application, which fails to prevent local users from gaining privileges. Successful exploitation could allow attackers to run arbitrary Lua s ...

oval:org.secpod.oval:def:3000
The host is installed with Wireshark 1.4.0 through 1.4.9 or 1.6.x before 1.6.3 and is prone to denial of service vulnerability. A flaw is present in the application which is caused due to an error in the Infiniband dissector that can allow a NULL pointer to be dereferenced when processing certain ma ...

oval:org.secpod.oval:def:3003
The host is installed with Wireshark 1.4.0 through 1.4.9 or 1.6.x before 1.6.3 and is prone to denial of service vulnerability. A flaw is present in the application which is caused due to an error in the Infiniband dissector that can allow a NULL pointer to be dereferenced when processing certain ma ...

oval:org.secpod.oval:def:1259
The host is installed with Wireshark and is prone to NULL pointer dereference vulnerability. A flaw is present in the application which is caused by an error in the desegment_tcp() function when handling TCP segments. Successful exploitation allows remote attacker to cause the application to crash.

oval:org.secpod.oval:def:1263
The host is installed with Wireshark and is prone to denial of service vulnerability. A flaw is present in the application, which is due to double free vulnerability in tvb_uncompress function in epan/tvbuff.c. Successful exploitation could allow attackers to crash the application via packet with ma ...

oval:org.secpod.oval:def:1517
The host is installed with Wireshark and is prone to denial of service vulnerability. A flaw is present in the application which fails to handle Lucent/Ascend file parser when processing malformed packets. Successful exploitation allows remote attacker to cause denial of service condition.

oval:org.secpod.oval:def:40838
The host is installed Wireshark 1.4.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle arbitrary TCP traffic. Successful exploitation allows remote attackers to cause a denial of service (NULL pointer dereference and application ...

oval:org.secpod.oval:def:40844
The host is installed Wireshark 1.2.x before 1.2.18, 1.4.x through 1.4.7 or 1.6.0 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle malformed packets. Successful exploitation allows remote attackers to cause a denial of service (i ...

oval:org.secpod.oval:def:40842
The host is installed Wireshark 1.2.x before 1.2.17 or 1.4.x before 1.4.7 and is prone to a double free vulnerability. A flaw is present in the application, which fails to properly handle a packet with malformed data. Successful exploitation allows remote attackers to cause a denial of service (appl ...

oval:org.secpod.oval:def:1260
The host is installed with Wireshark and is prone to denial of service vulnerability. A flaw is present in the application which is due to an error in DICOM dissector when processing certain malformed packets. Successful exploitation allows remote attacker to cause denial of service condition.

oval:org.secpod.oval:def:40839
The host is installed Wireshark 1.2.x before 1.2.17 or 1.4.x before 1.4.7 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle invalid PDU length. Successful exploitation allows remote attackers to cause a denial of service (applicat ...

oval:org.secpod.oval:def:5177
The host is installed with Wireshark 1.4.x before 1.4.12 or 1.6.x before 1.6.6 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle epan/dissectors/packet-ansi_a.c in the ANSI A dissector. Successful exploitation could allow remote attackers to ...

oval:org.secpod.oval:def:5187
The host is installed with Wireshark 1.4.x before 1.4.12 or 1.6.x before 1.6.6 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle epan/dissectors/packet-ansi_a.c in the ANSI A dissector. Successful exploitation could allow remote attackers to ...

oval:org.secpod.oval:def:5180
The host is installed with Wireshark 1.4.x before 1.4.12 or 1.6.x before 1.6.6 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle the mp2t_process_fragmented_payload function in epan/dissectors/packet-mp2t.c in the MP2T dissector. Successful ...

oval:org.secpod.oval:def:5190
The host is installed with Wireshark 1.4.x before 1.4.12 or 1.6.x before 1.6.6 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle the mp2t_process_fragmented_payload function in epan/dissectors/packet-mp2t.c in the MP2T dissector. Successful ...

oval:org.secpod.oval:def:6298
The host is installed with Wireshark 1.4.x before 1.4.13 or 1.6.x before 1.6.8 and is prone to multiple integer underflow vulnerabilities. The flaws are present in the application, which fails to handle vectors related to the R3 dissector. Successful exploitation allows remote attackers to cause a d ...

oval:org.secpod.oval:def:6294
The host is installed with Wireshark 1.4.x before 1.4.13 or 1.6.x before 1.6.8 and is prone to multiple integer underflow vulnerabilities. The flaws are present in the application, which fails to handle vectors related to the R3 dissector. Successful exploitation allows remote attackers to cause a d ...

oval:org.secpod.oval:def:6300
The host is installed with Wireshark 1.4.x before 1.4.13 and 1.6.x before 1.6.8 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly construct certain array data structures. Successful exploitation allows remote attackers to cause application ...

oval:org.secpod.oval:def:6296
The host is installed with Wireshark 1.4.x before 1.4.13 and 1.6.x before 1.6.8 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly construct certain array data structures. Successful exploitation allows remote attackers to cause application ...

oval:org.secpod.oval:def:6419
The host is installed with Wireshark 1.4.x before 1.4.14 or 1.6.x before 1.6.9 or 1.8.x before 1.8.1 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle the PPP dissector. Successful exploitation allows remote attackers to cause a denial of se ...

oval:org.secpod.oval:def:6417
The host is installed with Wireshark 1.4.x before 1.4.14 or 1.6.x before 1.6.9 or 1.8.x before 1.8.1 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle the PPP dissector. Successful exploitation allows remote attackers to cause a denial of se ...

oval:org.secpod.oval:def:6420
The host is installed with Wireshark 1.4.x before 1.4.14 or 1.6.x before 1.6.9 or 1.8.x before 1.8.1 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle the epan/dissectors/packet-nfs.c in the NFS dissector. Successful exploitation allows remo ...

oval:org.secpod.oval:def:6418
The host is installed with Wireshark 1.4.x before 1.4.14 or 1.6.x before 1.6.9 or 1.8.x before 1.8.1 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle the epan/dissectors/packet-nfs.c in the NFS dissector. Successful exploitation allows remo ...

oval:org.secpod.oval:def:2185
The host is installed with Wireshark 1.4.x before 1.4.8 or 1.6.x before 1.6.1 and is prone to a denial of service vulnerability. A flaw is present in an application, which fails to handle an invalid packet. Successful exploitation could allow attackers to crash the application.

oval:org.secpod.oval:def:5179
The host is installed with Wireshark 1.4.x before 1.4.12 or 1.6.x before 1.6.6 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle the pcap_process_pseudo_header function in wiretap/pcap-common.c. Successful exploitation could allow remote att ...

oval:org.secpod.oval:def:2187
The host is installed with Wireshark 1.4.x before 1.4.8 or 1.6.x before 1.6.1 and is prone to a denial of service vulnerability. A flaw is present in an application, which fails to handle an invalid packet. Successful exploitation could allow attackers to crash the application.

oval:org.secpod.oval:def:5176
The host is installed with Wireshark 1.4.x before 1.4.11 or 1.6.x before 1.6.5 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle the lanalyzer_read function in wiretap/lanalyzer.c. Successful exploitation could allow remote attackers to caus ...

oval:org.secpod.oval:def:600711
Laurent Butti discovered a buffer underflow in the LANalyzer dissector of the Wireshark network traffic analyzer, which could lead to the execution of arbitrary code This update also addresses several bugs, which can lead to crashes of Wireshark. These are not treated as security issues, but are fi ...

oval:org.secpod.oval:def:5171
The host is installed with Wireshark 1.4.x before 1.4.11 or 1.6.x before 1.6.5 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle the dissect_packet function in epan/packet.c file. Successful exploitation could allow remote attackers to cause ...

oval:org.secpod.oval:def:5175
The host is installed with Wireshark 1.4.x before 1.4.11 or 1.6.x before 1.6.5 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle wiretap/iptrace.c file. Successful exploitation could allow remote attackers to cause denial of service or appli ...

oval:org.secpod.oval:def:5174
The host is installed with Wireshark 1.4.x before 1.4.11 or 1.6.x before 1.6.5 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle a long packet in a Accellent 5Views (aka .5vw) file or I4B trace file or NETMON 2 capture file. Successful explo ...

oval:org.secpod.oval:def:5173
The host is installed with Wireshark 1.4.x before 1.4.11 or 1.6.x before 1.6.5 and is prone to buffer overflow vulnerability. A flaw is present in the application, which fails to handle reassemble_message function in epan/dissectors/packet-rlc.c in the RLC dissector. Successful exploitation could al ...

oval:org.secpod.oval:def:5172
The host is installed with Wireshark 1.4.x before 1.4.11 or 1.6.x before 1.6.5 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly perform certain string conversions. Successful exploitation could allow remote attackers to cause denial of se ...

oval:org.secpod.oval:def:1261
The host is installed with Wireshark and is prone to NULL pointer dereference vulnerability. A flaw is present in the application which is due to an error in the handling of corrupted Diameter dictionary file. Successful exploitation allows remote attacker to cause denial of service condition.

oval:org.secpod.oval:def:5189
The host is installed with Wireshark 1.4.x before 1.4.12 or 1.6.x before 1.6.6 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle the pcap_process_pseudo_header function in wiretap/pcap-common.c. Successful exploitation could allow remote att ...

oval:org.secpod.oval:def:1262
The host is installed with Wireshark and is prone to denial of service vulnerability. A flaw is present in the application which fails in the handling of corrupted snoop files. Successful exploitation allows remote attacker to cause application crash.

oval:org.secpod.oval:def:1264
The host is installed with Wireshark and is prone to denial of service vulnerability. A flaw is present in the application, which is caused due an integer overflow in the visual_read function in wiretap/visual.c. Successful exploitation could allow an attacker to create denial of service conditions ...

oval:org.secpod.oval:def:2999
The host is installed with Wireshark 1.4.0 through 1.4.9 or 1.6.x before 1.6.3 and is prone to heap-based buffer overflow vulnerability. A flaw is present in the application, which is caused due to an error in ERF file parser when processing certain malformed file. Successful exploitation allows rem ...

oval:org.secpod.oval:def:5182
The host is installed with Wireshark 1.4.x before 1.4.11 or 1.6.x before 1.6.5 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly perform certain string conversions. Successful exploitation could allow remote attackers to cause denial of se ...

oval:org.secpod.oval:def:5181
The host is installed with Wireshark 1.4.x before 1.4.11 or 1.6.x before 1.6.5 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle the dissect_packet function in epan/packet.c file. Successful exploitation could allow remote attackers to cause ...

oval:org.secpod.oval:def:5186
The host is installed with Wireshark 1.4.x before 1.4.11 or 1.6.x before 1.6.5 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle the lanalyzer_read function in wiretap/lanalyzer.c. Successful exploitation could allow remote attackers to caus ...

oval:org.secpod.oval:def:5185
The host is installed with Wireshark 1.4.x before 1.4.11 or 1.6.x before 1.6.5 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle wiretap/iptrace.c file. Successful exploitation could allow remote attackers to cause denial of service or appli ...

oval:org.secpod.oval:def:5184
The host is installed with Wireshark 1.4.x before 1.4.11 or 1.6.x before 1.6.5 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle a long packet in a Accellent 5Views (aka .5vw) file or I4B trace file or NETMON 2 capture file. Successful explo ...

oval:org.secpod.oval:def:5183
The host is installed with Wireshark 1.4.x before 1.4.11 or 1.6.x before 1.6.5 and is prone to buffer overflow vulnerability. A flaw is present in the application, which fails to handle reassemble_message function in epan/dissectors/packet-rlc.c in the RLC dissector. Successful exploitation could al ...

oval:org.secpod.oval:def:6768
The host is installed with Wireshark 1.4.x before 1.4.15 or 1.6.x before 1.6.10 or 1.8.x before 1.8.2 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle the dissect_pft function in epan/dissectors/packet-dcp-etsi.c in the DCP ETSI dissector. ...

oval:org.secpod.oval:def:501147
Wireshark, previously known as Ethereal, is a network protocol analyzer. It is used to capture and browse the traffic running on a computer network. Two flaws were found in Wireshark. If Wireshark read a malformed packet off a network or opened a malicious dump file, it could crash or, possibly, exe ...

oval:org.secpod.oval:def:6774
The host is installed with Wireshark 1.4.x before 1.4.15 or 1.6.x before 1.6.10 or 1.8.x before 1.8.2 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle the CIP dissector. Successful exploitation allows remote attackers to cause a denial of s ...

oval:org.secpod.oval:def:6773
The host is installed with Wireshark 1.4.x before 1.4.15 or 1.6.x before 1.6.10 or 1.8.x before 1.8.2 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle the CTDB dissector. Successful exploitation allows remote attackers to cause a denial of ...

oval:org.secpod.oval:def:6772
The host is installed with Wireshark 1.4.x before 1.4.15 or 1.6.x before 1.6.10 or 1.8.x before 1.8.2 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle a large number of ACL entries. Successful exploitation allows remote attackers to cause a ...

oval:org.secpod.oval:def:6776
The host is installed with Wireshark 1.4.x before 1.4.15 or 1.6.x before 1.6.10 or 1.8.x before 1.8.2 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle certain integer fields. Successful exploitation allows remote attackers to cause ...

oval:org.secpod.oval:def:600685
Huzaifa Sidhpurwala discovered a buffer overflow in Wireshark"s ERF dissector, which could lead to the execution of arbitrary code.

oval:org.secpod.oval:def:6779
The host is installed with Wireshark 1.4.x before 1.4.15 or 1.6.x before 1.6.10 or 1.8.x before 1.8.2 and is prone to buffer overflow vulnerability. A flaw is present in the application, which fails to handle the epan/dissectors/packet-rtps2.c in the RTPS2 dissector. Successful exploitation allows r ...

oval:org.secpod.oval:def:202528
Wireshark, previously known as Ethereal, is a network protocol analyzer. It is used to capture and browse the traffic running on a computer network. A heap-based buffer overflow flaw was found in the way Wireshark handled Endace ERF capture files. If Wireshark opened a specially-crafted ERF capture ...

oval:org.secpod.oval:def:40840
The host is installed Wireshark 1.2.x before 1.2.17 or 1.4.x before 1.4.7 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle crafted Diameter dictionary file. Successful exploitation allows remote attackers to cause a denial of ser ...

oval:org.secpod.oval:def:40843
The host is installed Wireshark 1.2.x before 1.2.17 or 1.4.x before 1.4.7 and is prone to an integer underflow vulnerability. A flaw is present in the application, which fails to properly handle a malformed Visual Networks file. Successful exploitation allows remote attackers to cause a denial of se ...

oval:org.secpod.oval:def:40841
The host is installed Wireshark 1.2.x before 1.2.17 or 1.4.x before 1.4.7 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle certain virtualizable buffers. Successful exploitation allows remote attackers to cause a denial of servic ...

oval:org.secpod.oval:def:6906
The host is installed with Wireshark 1.4.x before 1.4.15 or 1.6.x before 1.6.10 or 1.8.x before 1.8.2 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle the dissect_pft function in epan/dissectors/packet-dcp-etsi.c in the DCP ETSI dissector. ...

oval:org.secpod.oval:def:1500080
Updated wireshark packages that fix several security issues, three bugs,and add one enhancement are now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having moderatesecurity impact. Common Vulnerability Scoring System base scores,which give de ...

oval:org.secpod.oval:def:3004
The host is installed with Wireshark 1.4.0 through 1.4.9 or 1.6.x before 1.6.3 and is prone to heap-based buffer overflow vulnerability. A flaw is present in the application, which is caused due to an error in ERF file parser when processing certain malformed file. Successful exploitation allows rem ...

oval:org.secpod.oval:def:6910
The host is installed with Wireshark 1.4.x before 1.4.15 or 1.6.x before 1.6.10 or 1.8.x before 1.8.2 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle the CTDB dissector. Successful exploitation allows remote attackers to cause a denial of ...

oval:org.secpod.oval:def:600584
Huzaifa Sidhpurwala, David Maciejak and others discovered several vulnerabilities in the X.509if and DICOM dissectors and in the code to process various capture and dictionary files, which could lead to denial of service or the execution of arbitrary code.

oval:org.secpod.oval:def:6913
The host is installed with Wireshark 1.4.x before 1.4.15 or 1.6.x before 1.6.10 or 1.8.x before 1.8.2 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle certain integer fields. Successful exploitation allows remote attackers to cause ...

oval:org.secpod.oval:def:6911
The host is installed with Wireshark 1.4.x before 1.4.15 or 1.6.x before 1.6.10 or 1.8.x before 1.8.2 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle the CIP dissector. Successful exploitation allows remote attackers to cause a denial of s ...

oval:org.secpod.oval:def:6916
The host is installed with Wireshark 1.4.x before 1.4.15 or 1.6.x before 1.6.10 or 1.8.x before 1.8.2 and is prone to buffer overflow vulnerability. A flaw is present in the application, which fails to handle the epan/dissectors/packet-rtps2.c in the RTPS2 dissector. Successful exploitation allows r ...

oval:org.secpod.oval:def:6909
The host is installed with Wireshark 1.4.x before 1.4.15 or 1.6.x before 1.6.10 or 1.8.x before 1.8.2 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle the epan/dissectors/packet-afp.c in the AFP dissector. Successful exploitation allows rem ...

oval:org.secpod.oval:def:500936
Wireshark, previously known as Ethereal, is a network protocol analyzer. It is used to capture and browse the traffic running on a computer network. A heap-based buffer overflow flaw was found in the way Wireshark handled Endace ERF capture files. If Wireshark opened a specially-crafted ERF capture ...

oval:org.secpod.oval:def:6301
The host is installed with Wireshark 1.4.x before 1.4.13 and 1.6.x before 1.6.8 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle vectors related to the ANSI MAP, ASF, IEEE 802.11, IEEE 802.3 and LTP dissectors. Successful exploitation allow ...

oval:org.secpod.oval:def:1500299
Updated wireshark packages that fix multiple security issues, several bugs, and add various enhancements are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System base scores, wh ...

oval:org.secpod.oval:def:6771
The host is installed with Wireshark 1.4.x before 1.4.15 or 1.6.x before 1.6.10 or 1.8.x before 1.8.2 and is prone to integer overflow vulnerability. A flaw is present in the application, which fails to handle the dissect_xtp_ecntl function in epan/dissectors/packet-xtp.c in the XTP dissector. Succe ...

oval:org.secpod.oval:def:1600294
Two flaws were found in Wireshark. If Wireshark read a malformed packet off a network or opened a malicious dump file, it could crash or, possibly, execute arbitrary code as the user running Wireshark. Several denial of service flaws were found in Wireshark. Wireshark could crash or stop responding ...

oval:org.secpod.oval:def:6775
The host is installed with Wireshark 1.4.x before 1.4.15 or 1.6.x before 1.6.10 or 1.8.x before 1.8.2 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle the dissect_stun_message function in epan/dissectors/packet-stun.c in the STUN dissector. ...

oval:org.secpod.oval:def:6912
The host is installed with Wireshark 1.4.x before 1.4.15 or 1.6.x before 1.6.10 or 1.8.x before 1.8.2 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle the dissect_stun_message function in epan/dissectors/packet-stun.c in the STUN dissector. ...

oval:org.secpod.oval:def:6908
The host is installed with Wireshark 1.4.x before 1.4.15 or 1.6.x before 1.6.10 or 1.8.x before 1.8.2 and is prone to integer overflow vulnerability. A flaw is present in the application, which fails to handle the dissect_xtp_ecntl function in epan/dissectors/packet-xtp.c in the XTP dissector. Succe ...

oval:org.secpod.oval:def:6299
The host is installed with Wireshark 1.4.x before 1.4.13 and 1.6.x before 1.6.8 and is prone to multiple integer overflow vulnerabilities. The flaws are present in the application, which fails to handle vectors related to the BACapp and Bluetooth HCI dissectors. Successful exploitation allows remote ...

oval:org.secpod.oval:def:6297
The host is installed with Wireshark 1.4.x before 1.4.13 and 1.6.x before 1.6.8 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle vectors related to the ANSI MAP, ASF, IEEE 802.11, IEEE 802.3 and LTP dissectors. Successful exploitation allow ...

oval:org.secpod.oval:def:6295
The host is installed with Wireshark 1.4.x before 1.4.13 and 1.6.x before 1.6.8 and is prone to multiple integer overflow vulnerabilities. The flaws are present in the application, which fails to handle vectors related to the BACapp and Bluetooth HCI dissectors. Successful exploitation allows remote ...

oval:org.secpod.oval:def:500786
Wireshark is a program for monitoring network traffic. Wireshark was previously known as Ethereal. Several flaws were found in Wireshark. If Wireshark read a malformed packet off a network or opened a malicious dump file, it could crash or, possibly, execute arbitrary code as the user running Wiresh ...

oval:org.secpod.oval:def:202326
Wireshark is a program for monitoring network traffic. Wireshark was previously known as Ethereal. Several flaws were found in Wireshark. If Wireshark read a malformed packet off a network or opened a malicious dump file, it could crash or, possibly, execute arbitrary code as the user running Wiresh ...

CVE    35
CVE-2011-1956
CVE-2011-3266
CVE-2011-3360
CVE-2011-4101
...
*CPE
cpe:/a:wireshark:wireshark:1.4.5

© SecPod Technologies