Download
| Alert*
oval:org.secpod.oval:def:8162
The host is installed with Wireshark 1.6.x before 1.6.12 or 1.8.x before 1.8.4 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle the epan/dissectors/packet-usb.c in the USB dissector. Successful exploitation allows remote attackers to cause ... oval:org.secpod.oval:def:8157 The host is installed with Wireshark 1.6.x before 1.6.12 or 1.8.x before 1.8.4 and is prone to integer overflow vulnerability. A flaw is present in the application, which fails to handle the dissect_icmpv6 function in epan/dissectors/packet-icmpv6.c in the ICMPv6 dissector. Successful exploitation a ... oval:org.secpod.oval:def:600966 Multiple vulnerabilities were discovered in the dissectors for the CLNP, DTLS, DCP-ETSI and NTLMSSP protocols, which could result in denial of service or the execution of arbitrary code. oval:org.secpod.oval:def:8156 The host is installed with Wireshark 1.6.x before 1.6.12 or 1.8.x before 1.8.4 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle the dissect_isakmp function in epan/dissectors/packet-isakmp.c in the ISAKMP dissector. Successful exploitation ... oval:org.secpod.oval:def:600989 Multiple vulnerabilities were discovered in the dissectors for the MS-MMS, RTPS, RTPS2, Mount, ACN, CIMD and DTLS protocols, which could result in denial of service or the execution of arbitrary code. oval:org.secpod.oval:def:9100 The host is installed with Wireshark 1.6.x before 1.6.13 or 1.8.x before 1.8.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle certain short lengths. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:9091 The host is installed with Wireshark 1.6.x before 1.6.13 or 1.8.x before 1.8.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle fragment gaps. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:9092 The host is installed with Wireshark 1.6.x before 1.6.13 or 1.8.x before 1.8.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle an incorrect data type for a position variable. Successful exploitation could allow attackers to cras ... oval:org.secpod.oval:def:9093 The host is installed with Wireshark 1.6.x before 1.6.13 or 1.8.x before 1.8.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly implement certain nested loops for processing bitmap data. Successful exploitation could allow attackers to ... oval:org.secpod.oval:def:9094 The host is installed with Wireshark 1.6.x before 1.6.13 or 1.8.x before 1.8.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle apparent Ethernet address values at the beginning of MPLS data. Successful exploitation could allow a ... oval:org.secpod.oval:def:9090 The host is installed with Wireshark 1.6.x before 1.6.13 or 1.8.x before 1.8.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly manage an offset variable. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:9099 The host is installed with Wireshark 1.6.x before 1.6.13 or 1.8.x before 1.8.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a large number of padding bits. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:9095 The host is installed with Wireshark 1.6.x before 1.6.13 or 1.8.x before 1.8.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle offset data associated with a quoted string. Successful exploitation could allow attackers to crash t ... oval:org.secpod.oval:def:9096 The host is installed with Wireshark 1.6.x before 1.6.13 or 1.8.x before 1.8.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly process crypto-suite parameters. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:9097 The host is installed with Wireshark 1.6.x before 1.6.13 or 1.8.x before 1.8.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a certain alarm length. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:9098 The host is installed with Wireshark 1.6.x before 1.6.13 or 1.8.x before 1.8.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle an incorrect data type for a counter variable. Successful exploitation could allow attackers to crash ... oval:org.secpod.oval:def:14124 The host is installed with Wireshark 1.6.x before 1.6.16 or 1.8.x before 1.8.8 and is prone to denial of service vulnerability. A flaw is present in the application, which incorrectly uses a -1 data value to represent an error condition. Successful exploitation allows attackers to cause an applicati ... oval:org.secpod.oval:def:9082 The host is installed with Wireshark 1.6.x before 1.6.13 or 1.8.x before 1.8.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a malformed packet. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:9083 The host is installed with Wireshark 1.6.x before 1.6.13 or 1.8.x before 1.8.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a malformed packet. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:9088 The host is installed with Wireshark 1.6.x before 1.6.13 or 1.8.x before 1.8.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which tries to access an inappropriate pointer. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:9089 The host is installed with Wireshark 1.6.x before 1.6.13 or 1.8.x before 1.8.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which tries to access an inappropriate pointer. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:9084 The host is installed with Wireshark 1.6.x before 1.6.13 or 1.8.x before 1.8.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a malformed packet. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:9085 The host is installed with Wireshark 1.8.x before 1.8.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle unknown profiles. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:9086 The host is installed with Wireshark 1.6.x before 1.6.13 or 1.8.x before 1.8.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly determine the length of a reassembled packet for the DTLS dissector. Successful exploitation could allow att ... oval:org.secpod.oval:def:9087 The host is installed with Wireshark 1.6.x before 1.6.13 or 1.8.x before 1.8.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly validate certain length values for the MS-MMC dissector. Successful exploitation could allow attackers to cr ... oval:org.secpod.oval:def:600931 Bjorn Mork and Laurent Butti discovered crashes in the PPP and RTPS2 dissectors, which could potentially result in the execution of arbitrary code. oval:org.secpod.oval:def:3000 The host is installed with Wireshark 1.4.0 through 1.4.9 or 1.6.x before 1.6.3 and is prone to denial of service vulnerability. A flaw is present in the application which is caused due to an error in the Infiniband dissector that can allow a NULL pointer to be dereferenced when processing certain ma ... oval:org.secpod.oval:def:3001 The host is installed with Wireshark 1.6.x before 1.6.3 and is prone to denial of service vulnerability. A flaw is present in the CSN.1 dissector which is caused due to an error when processing certain malformed packets. Successful exploitation allows remote attackers to cause an application crash. oval:org.secpod.oval:def:3002 The host is installed with Wireshark 1.6.x before 1.6.3 and is prone to denial of service vulnerability. A flaw is present in the CSN.1 dissector which is caused due to an error when processing certain malformed packets. Successful exploitation allows remote attackers to cause an application crash. oval:org.secpod.oval:def:3003 The host is installed with Wireshark 1.4.0 through 1.4.9 or 1.6.x before 1.6.3 and is prone to denial of service vulnerability. A flaw is present in the application which is caused due to an error in the Infiniband dissector that can allow a NULL pointer to be dereferenced when processing certain ma ... oval:org.secpod.oval:def:14134 The host is installed with Wireshark 1.6.x before 1.6.16 or 1.8.x before 1.8.8 and is prone to denial of service vulnerability. A flaw is present in the application, which incorrectly uses a -1 data value to represent an error condition. Successful exploitation allows attackers to cause an applicati ... oval:org.secpod.oval:def:17111 The host is installed with Wireshark 1.6.x through 1.6.10 or 1.8.x through 1.8.2 and is prone to denial of service vulnerability. A flaw is present in the dissect_drda function in epan/dissectors/packet-drda.c, which fails to properly handle a small value for a certain length field in a capture file ... oval:org.secpod.oval:def:17110 The host is installed with Wireshark 1.6.x before 1.6.15 or 1.8.x before 1.8.7 and is prone to denial of service vulnerability. A flaw is present in the fragment_add_seq_common function in epan/reassemble.c in the ASN.1 BER dissector, which fails to handle a malformed packet. Successful exploitation ... oval:org.secpod.oval:def:9973 The host is installed with Wireshark 1.8.x before 1.8.6 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle a malformed packet. Successful exploitation allows remote attackers to cause a denial of service (application crash). oval:org.secpod.oval:def:9972 The host is installed with Wireshark 1.8.x before 1.8.6 or 1.6.x before 1.6.14 and is prone to Integer signedness error vulnerability. A flaw is present in the application, which fails to handle a negative length value. Successful exploitation allows attackers to cause a denial of service (applicati ... oval:org.secpod.oval:def:9975 The host is installed with Wireshark 1.8.x before 1.8.6 or 1.6.x before 1.6.14 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly manage string lengths. Successful exploitation allows remote attackers to cause a denial of service (applicati ... oval:org.secpod.oval:def:40848 The host is installed Wireshark 1.6.0 before 1.6.15 or 1.8.x before 1.8.7 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a crafted packet-trace file that triggers a buffer overflow. Successful exploitation allows remote attacke ... oval:org.secpod.oval:def:40845 The host is installed Wireshark 1.6.x through 1.6.10 or 1.8.x through 1.8.2 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a small value for a certain length field in a capture file. Successful exploitation allows remote attack ... oval:org.secpod.oval:def:9971 The host is installed with Wireshark 1.8.x before 1.8.6 or 1.6.x before 1.6.14 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle a malformed packet. Successful exploitation allows attackers to cause a denial of service (infinite loop). oval:org.secpod.oval:def:9970 The host is installed with Wireshark 1.8.x before 1.8.6 or 1.6.x before 1.6.14 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle an invalid count value in ACN_DMP_ADT_D_RE DMP data. Successful exploitation allows attackers to cause a denial ... oval:org.secpod.oval:def:9965 The host is installed with Wireshark 1.6.x before 1.6.14 or 1.8.x before 1.8.6 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to validate the fragment offset before invoking the reassembly state machine. Successful exploitation allows remote attack ... oval:org.secpod.oval:def:9968 The host is installed with Wireshark 1.6.x before 1.6.14 or 1.8.x before 1.8.6 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle a malformed packet. Successful exploitation allows remote attackers to cause the application to crash. oval:org.secpod.oval:def:9969 The host is installed with 1.6.x before 1.6.14 or 1.8.x before 1.8.6 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle a malformed packet. Successful exploitation allows attackers to cause an application crash. oval:org.secpod.oval:def:5178 The host is installed with Wireshark 1.6.x before 1.6.6 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle epan/dissectors/packet-ieee80211.c in the IEEE 802.11 dissector. Successful exploitation could allow remote attackers to cause denial o ... oval:org.secpod.oval:def:5188 The host is installed with Wireshark 1.6.x before 1.6.6 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle epan/dissectors/packet-ieee80211.c in the IEEE 802.11 dissector. Successful exploitation could allow remote attackers to cause denial o ... oval:org.secpod.oval:def:5190 The host is installed with Wireshark 1.4.x before 1.4.12 or 1.6.x before 1.6.6 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle the mp2t_process_fragmented_payload function in epan/dissectors/packet-mp2t.c in the MP2T dissector. Successful ... oval:org.secpod.oval:def:5180 The host is installed with Wireshark 1.4.x before 1.4.12 or 1.6.x before 1.6.6 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle the mp2t_process_fragmented_payload function in epan/dissectors/packet-mp2t.c in the MP2T dissector. Successful ... oval:org.secpod.oval:def:6298 The host is installed with Wireshark 1.4.x before 1.4.13 or 1.6.x before 1.6.8 and is prone to multiple integer underflow vulnerabilities. The flaws are present in the application, which fails to handle vectors related to the R3 dissector. Successful exploitation allows remote attackers to cause a d ... oval:org.secpod.oval:def:6294 The host is installed with Wireshark 1.4.x before 1.4.13 or 1.6.x before 1.6.8 and is prone to multiple integer underflow vulnerabilities. The flaws are present in the application, which fails to handle vectors related to the R3 dissector. Successful exploitation allows remote attackers to cause a d ... oval:org.secpod.oval:def:6300 The host is installed with Wireshark 1.4.x before 1.4.13 and 1.6.x before 1.6.8 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly construct certain array data structures. Successful exploitation allows remote attackers to cause application ... oval:org.secpod.oval:def:6296 The host is installed with Wireshark 1.4.x before 1.4.13 and 1.6.x before 1.6.8 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly construct certain array data structures. Successful exploitation allows remote attackers to cause application ... oval:org.secpod.oval:def:6419 The host is installed with Wireshark 1.4.x before 1.4.14 or 1.6.x before 1.6.9 or 1.8.x before 1.8.1 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle the PPP dissector. Successful exploitation allows remote attackers to cause a denial of se ... oval:org.secpod.oval:def:6417 The host is installed with Wireshark 1.4.x before 1.4.14 or 1.6.x before 1.6.9 or 1.8.x before 1.8.1 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle the PPP dissector. Successful exploitation allows remote attackers to cause a denial of se ... oval:org.secpod.oval:def:6420 The host is installed with Wireshark 1.4.x before 1.4.14 or 1.6.x before 1.6.9 or 1.8.x before 1.8.1 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle the epan/dissectors/packet-nfs.c in the NFS dissector. Successful exploitation allows remo ... oval:org.secpod.oval:def:6418 The host is installed with Wireshark 1.4.x before 1.4.14 or 1.6.x before 1.6.9 or 1.8.x before 1.8.1 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle the epan/dissectors/packet-nfs.c in the NFS dissector. Successful exploitation allows remo ... oval:org.secpod.oval:def:8167 The host is installed with Wireshark 1.6.x before 1.6.12 or 1.8.x before 1.8.4 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle the dissect_isakmp function in epan/dissectors/packet-isakmp.c in the ISAKMP dissector. Successful exploitation ... oval:org.secpod.oval:def:8168 The host is installed with Wireshark 1.6.x before 1.6.12 or 1.8.x before 1.8.4 and is prone to integer overflow vulnerability. A flaw is present in the application, which fails to handle the dissect_icmpv6 function in epan/dissectors/packet-icmpv6.c in the ICMPv6 dissector. Successful exploitation a ... oval:org.secpod.oval:def:8173 The host is installed with Wireshark 1.6.x before 1.6.12 or 1.8.x before 1.8.4 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle the epan/dissectors/packet-usb.c in the USB dissector. Successful exploitation allows remote attackers to cause ... oval:org.secpod.oval:def:9101 The host is installed with Wireshark 1.6.x before 1.6.13 or 1.8.x before 1.8.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a malformed packet. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:9102 The host is installed with Wireshark 1.6.x before 1.6.13 or 1.8.x before 1.8.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a malformed packet. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:9103 The host is installed with Wireshark 1.6.x before 1.6.13 or 1.8.x before 1.8.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a malformed packet. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:9104 The host is installed with Wireshark 1.8.x before 1.8.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle unknown profiles. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:9105 The host is installed with Wireshark 1.6.x before 1.6.13 or 1.8.x before 1.8.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly determine the length of a reassembled packet for the DTLS dissector. Successful exploitation could allow att ... oval:org.secpod.oval:def:9106 The host is installed with Wireshark 1.6.x before 1.6.13 or 1.8.x before 1.8.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly validate certain length values for the MS-MMC dissector. Successful exploitation could allow attackers to cr ... oval:org.secpod.oval:def:9107 The host is installed with Wireshark 1.6.x before 1.6.13 or 1.8.x before 1.8.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which tries to access an inappropriate pointer. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:9108 The host is installed with Wireshark 1.6.x before 1.6.13 or 1.8.x before 1.8.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which tries to access an inappropriate pointer. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:9109 The host is installed with Wireshark 1.6.x before 1.6.13 or 1.8.x before 1.8.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly manage an offset variable. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:9110 The host is installed with Wireshark 1.6.x before 1.6.13 or 1.8.x before 1.8.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle fragment gaps. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:9111 The host is installed with Wireshark 1.6.x before 1.6.13 or 1.8.x before 1.8.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle an incorrect data type for a position variable. Successful exploitation could allow attackers to cras ... oval:org.secpod.oval:def:9112 The host is installed with Wireshark 1.6.x before 1.6.13 or 1.8.x before 1.8.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly implement certain nested loops for processing bitmap data. Successful exploitation could allow attackers to ... oval:org.secpod.oval:def:9113 The host is installed with Wireshark 1.6.x before 1.6.13 or 1.8.x before 1.8.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle apparent Ethernet address values at the beginning of MPLS data. Successful exploitation could allow a ... oval:org.secpod.oval:def:9114 The host is installed with Wireshark 1.6.x before 1.6.13 or 1.8.x before 1.8.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle offset data associated with a quoted string. Successful exploitation could allow attackers to crash t ... oval:org.secpod.oval:def:9115 The host is installed with Wireshark 1.6.x before 1.6.13 or 1.8.x before 1.8.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly process crypto-suite parameters. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:9116 The host is installed with Wireshark 1.6.x before 1.6.13 or 1.8.x before 1.8.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a certain alarm length. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:9117 The host is installed with Wireshark 1.6.x before 1.6.13 or 1.8.x before 1.8.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle an incorrect data type for a counter variable. Successful exploitation could allow attackers to crash ... oval:org.secpod.oval:def:9118 The host is installed with Wireshark 1.6.x before 1.6.13 or 1.8.x before 1.8.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a large number of padding bits. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:9119 The host is installed with Wireshark 1.6.x before 1.6.13 or 1.8.x before 1.8.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle certain short lengths. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:9979 The host is installed with Wireshark 1.6.x before 1.6.14 or 1.8.x before 1.8.6 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to validate the fragment offset before invoking the reassembly state machine. Successful exploitation allows remote attack ... oval:org.secpod.oval:def:9982 The host is installed with Wireshark 1.6.x before 1.6.14 or 1.8.x before 1.8.6 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle a malformed packet. Successful exploitation allows remote attackers to cause the application to crash. oval:org.secpod.oval:def:9983 The host is installed with 1.6.x before 1.6.14 or 1.8.x before 1.8.6 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle a malformed packet. Successful exploitation allows attackers to cause an application crash. oval:org.secpod.oval:def:9984 The host is installed with Wireshark 1.8.x before 1.8.6 or 1.6.x before 1.6.14 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle an invalid count value in ACN_DMP_ADT_D_RE DMP data. Successful exploitation allows attackers to cause a denial ... oval:org.secpod.oval:def:9985 The host is installed with Wireshark 1.8.x before 1.8.6 or 1.6.x before 1.6.14 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle a malformed packet. Successful exploitation allows attackers to cause a denial of service (infinite loop). oval:org.secpod.oval:def:9986 The host is installed with Wireshark 1.8.x before 1.8.6 or 1.6.x before 1.6.14 and is prone to Integer signedness error vulnerability. A flaw is present in the application, which fails to handle a negative length value. Successful exploitation allows attackers to cause a denial of service (applicati ... oval:org.secpod.oval:def:9987 The host is installed with Wireshark 1.8.x before 1.8.6 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle a malformed packet. Successful exploitation allows remote attackers to cause a denial of service (application crash). oval:org.secpod.oval:def:9989 The host is installed with Wireshark 1.8.x before 1.8.6 or 1.6.x before 1.6.14 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly manage string lengths. Successful exploitation allows remote attackers to cause a denial of service (applicati ... oval:org.secpod.oval:def:600711 Laurent Butti discovered a buffer underflow in the LANalyzer dissector of the Wireshark network traffic analyzer, which could lead to the execution of arbitrary code This update also addresses several bugs, which can lead to crashes of Wireshark. These are not treated as security issues, but are fi ... oval:org.secpod.oval:def:6780 The host is installed with Wireshark 1.6.x before 1.6.10 or 1.8.x before 1.8.2 and is prone to buffer overflow vulnerability. A flaw is present in the application, which fails to handle the dissect_gsm_rlcmac_downlink function in epan/dissectors/packet-gsm_rlcmac.c in the GSM RLC MAC dissector. Succ ... oval:org.secpod.oval:def:2999 The host is installed with Wireshark 1.4.0 through 1.4.9 or 1.6.x before 1.6.3 and is prone to heap-based buffer overflow vulnerability. A flaw is present in the application, which is caused due to an error in ERF file parser when processing certain malformed file. Successful exploitation allows rem ... oval:org.secpod.oval:def:6768 The host is installed with Wireshark 1.4.x before 1.4.15 or 1.6.x before 1.6.10 or 1.8.x before 1.8.2 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle the dissect_pft function in epan/dissectors/packet-dcp-etsi.c in the DCP ETSI dissector. ... oval:org.secpod.oval:def:6774 The host is installed with Wireshark 1.4.x before 1.4.15 or 1.6.x before 1.6.10 or 1.8.x before 1.8.2 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle the CIP dissector. Successful exploitation allows remote attackers to cause a denial of s ... oval:org.secpod.oval:def:6773 The host is installed with Wireshark 1.4.x before 1.4.15 or 1.6.x before 1.6.10 or 1.8.x before 1.8.2 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle the CTDB dissector. Successful exploitation allows remote attackers to cause a denial of ... oval:org.secpod.oval:def:6772 The host is installed with Wireshark 1.4.x before 1.4.15 or 1.6.x before 1.6.10 or 1.8.x before 1.8.2 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle a large number of ACL entries. Successful exploitation allows remote attackers to cause a ... oval:org.secpod.oval:def:6776 The host is installed with Wireshark 1.4.x before 1.4.15 or 1.6.x before 1.6.10 or 1.8.x before 1.8.2 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle certain integer fields. Successful exploitation allows remote attackers to cause ... oval:org.secpod.oval:def:6779 The host is installed with Wireshark 1.4.x before 1.4.15 or 1.6.x before 1.6.10 or 1.8.x before 1.8.2 and is prone to buffer overflow vulnerability. A flaw is present in the application, which fails to handle the epan/dissectors/packet-rtps2.c in the RTPS2 dissector. Successful exploitation allows r ... oval:org.secpod.oval:def:202528 Wireshark, previously known as Ethereal, is a network protocol analyzer. It is used to capture and browse the traffic running on a computer network. A heap-based buffer overflow flaw was found in the way Wireshark handled Endace ERF capture files. If Wireshark opened a specially-crafted ERF capture ... oval:org.secpod.oval:def:1500080 Updated wireshark packages that fix several security issues, three bugs,and add one enhancement are now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having moderatesecurity impact. Common Vulnerability Scoring System base scores,which give de ... oval:org.secpod.oval:def:3004 The host is installed with Wireshark 1.4.0 through 1.4.9 or 1.6.x before 1.6.3 and is prone to heap-based buffer overflow vulnerability. A flaw is present in the application, which is caused due to an error in ERF file parser when processing certain malformed file. Successful exploitation allows rem ... oval:org.secpod.oval:def:5179 The host is installed with Wireshark 1.4.x before 1.4.12 or 1.6.x before 1.6.6 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle the pcap_process_pseudo_header function in wiretap/pcap-common.c. Successful exploitation could allow remote att ... oval:org.secpod.oval:def:5176 The host is installed with Wireshark 1.4.x before 1.4.11 or 1.6.x before 1.6.5 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle the lanalyzer_read function in wiretap/lanalyzer.c. Successful exploitation could allow remote attackers to caus ... oval:org.secpod.oval:def:5171 The host is installed with Wireshark 1.4.x before 1.4.11 or 1.6.x before 1.6.5 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle the dissect_packet function in epan/packet.c file. Successful exploitation could allow remote attackers to cause ... oval:org.secpod.oval:def:5175 The host is installed with Wireshark 1.4.x before 1.4.11 or 1.6.x before 1.6.5 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle wiretap/iptrace.c file. Successful exploitation could allow remote attackers to cause denial of service or appli ... oval:org.secpod.oval:def:5174 The host is installed with Wireshark 1.4.x before 1.4.11 or 1.6.x before 1.6.5 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle a long packet in a Accellent 5Views (aka .5vw) file or I4B trace file or NETMON 2 capture file. Successful explo ... oval:org.secpod.oval:def:5173 The host is installed with Wireshark 1.4.x before 1.4.11 or 1.6.x before 1.6.5 and is prone to buffer overflow vulnerability. A flaw is present in the application, which fails to handle reassemble_message function in epan/dissectors/packet-rlc.c in the RLC dissector. Successful exploitation could al ... oval:org.secpod.oval:def:5172 The host is installed with Wireshark 1.4.x before 1.4.11 or 1.6.x before 1.6.5 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly perform certain string conversions. Successful exploitation could allow remote attackers to cause denial of se ... oval:org.secpod.oval:def:5189 The host is installed with Wireshark 1.4.x before 1.4.12 or 1.6.x before 1.6.6 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle the pcap_process_pseudo_header function in wiretap/pcap-common.c. Successful exploitation could allow remote att ... oval:org.secpod.oval:def:5182 The host is installed with Wireshark 1.4.x before 1.4.11 or 1.6.x before 1.6.5 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly perform certain string conversions. Successful exploitation could allow remote attackers to cause denial of se ... oval:org.secpod.oval:def:5181 The host is installed with Wireshark 1.4.x before 1.4.11 or 1.6.x before 1.6.5 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle the dissect_packet function in epan/packet.c file. Successful exploitation could allow remote attackers to cause ... oval:org.secpod.oval:def:5186 The host is installed with Wireshark 1.4.x before 1.4.11 or 1.6.x before 1.6.5 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle the lanalyzer_read function in wiretap/lanalyzer.c. Successful exploitation could allow remote attackers to caus ... oval:org.secpod.oval:def:5185 The host is installed with Wireshark 1.4.x before 1.4.11 or 1.6.x before 1.6.5 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle wiretap/iptrace.c file. Successful exploitation could allow remote attackers to cause denial of service or appli ... oval:org.secpod.oval:def:5184 The host is installed with Wireshark 1.4.x before 1.4.11 or 1.6.x before 1.6.5 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle a long packet in a Accellent 5Views (aka .5vw) file or I4B trace file or NETMON 2 capture file. Successful explo ... oval:org.secpod.oval:def:5183 The host is installed with Wireshark 1.4.x before 1.4.11 or 1.6.x before 1.6.5 and is prone to buffer overflow vulnerability. A flaw is present in the application, which fails to handle reassemble_message function in epan/dissectors/packet-rlc.c in the RLC dissector. Successful exploitation could al ... oval:org.secpod.oval:def:501147 Wireshark, previously known as Ethereal, is a network protocol analyzer. It is used to capture and browse the traffic running on a computer network. Two flaws were found in Wireshark. If Wireshark read a malformed packet off a network or opened a malicious dump file, it could crash or, possibly, exe ... oval:org.secpod.oval:def:600685 Huzaifa Sidhpurwala discovered a buffer overflow in Wireshark"s ERF dissector, which could lead to the execution of arbitrary code. oval:org.secpod.oval:def:6906 The host is installed with Wireshark 1.4.x before 1.4.15 or 1.6.x before 1.6.10 or 1.8.x before 1.8.2 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle the dissect_pft function in epan/dissectors/packet-dcp-etsi.c in the DCP ETSI dissector. ... oval:org.secpod.oval:def:6910 The host is installed with Wireshark 1.4.x before 1.4.15 or 1.6.x before 1.6.10 or 1.8.x before 1.8.2 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle the CTDB dissector. Successful exploitation allows remote attackers to cause a denial of ... oval:org.secpod.oval:def:6913 The host is installed with Wireshark 1.4.x before 1.4.15 or 1.6.x before 1.6.10 or 1.8.x before 1.8.2 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle certain integer fields. Successful exploitation allows remote attackers to cause ... oval:org.secpod.oval:def:6911 The host is installed with Wireshark 1.4.x before 1.4.15 or 1.6.x before 1.6.10 or 1.8.x before 1.8.2 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle the CIP dissector. Successful exploitation allows remote attackers to cause a denial of s ... oval:org.secpod.oval:def:6917 The host is installed with Wireshark 1.6.x before 1.6.10 or 1.8.x before 1.8.2 and is prone to buffer overflow vulnerability. A flaw is present in the application, which fails to handle the dissect_gsm_rlcmac_downlink function in epan/dissectors/packet-gsm_rlcmac.c in the GSM RLC MAC dissector. Succ ... oval:org.secpod.oval:def:6916 The host is installed with Wireshark 1.4.x before 1.4.15 or 1.6.x before 1.6.10 or 1.8.x before 1.8.2 and is prone to buffer overflow vulnerability. A flaw is present in the application, which fails to handle the epan/dissectors/packet-rtps2.c in the RTPS2 dissector. Successful exploitation allows r ... oval:org.secpod.oval:def:6909 The host is installed with Wireshark 1.4.x before 1.4.15 or 1.6.x before 1.6.10 or 1.8.x before 1.8.2 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle the epan/dissectors/packet-afp.c in the AFP dissector. Successful exploitation allows rem ... oval:org.secpod.oval:def:500936 Wireshark, previously known as Ethereal, is a network protocol analyzer. It is used to capture and browse the traffic running on a computer network. A heap-based buffer overflow flaw was found in the way Wireshark handled Endace ERF capture files. If Wireshark opened a specially-crafted ERF capture ... oval:org.secpod.oval:def:6301 The host is installed with Wireshark 1.4.x before 1.4.13 and 1.6.x before 1.6.8 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle vectors related to the ANSI MAP, ASF, IEEE 802.11, IEEE 802.3 and LTP dissectors. Successful exploitation allow ... oval:org.secpod.oval:def:8164 The host is installed with Wireshark 1.6.x before 1.6.12 or 1.8.x before 1.8.4 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle the dissect_rtcp_app function in epan/dissectors/packet-rtcp.c in the RTCP dissector. Successful exploitation al ... oval:org.secpod.oval:def:8165 The host is installed with Wireshark 1.6.x before 1.6.12 or 1.8.x before 1.8.4 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle the dissect_wtp_common function in epan/dissectors/packet-wtp.c in the WTP dissector. Successful exploitation al ... oval:org.secpod.oval:def:8166 The host is installed with Wireshark 1.6.x before 1.6.12 or 1.8.x before 1.8.4 and is prone to integer overflow vulnerability. A flaw is present in the application, which fails to handle the dissect_iscsi_pdu function in epan/dissectors/packet-iscsi.c in the iSCSI dissector. Successful exploitation ... oval:org.secpod.oval:def:13763 The host is installed with Wireshark 1.6.x before 1.6.15 or 1.8.x before 1.8.7 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly initialize a certain variable. Successful exploitation allows attackers to cause an application crash. oval:org.secpod.oval:def:13770 The host is installed with Wireshark 1.6.x before 1.6.15 or 1.8.x before 1.8.7 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly initialize a certain variable. Successful exploitation allows attackers to cause an application crash. oval:org.secpod.oval:def:6771 The host is installed with Wireshark 1.4.x before 1.4.15 or 1.6.x before 1.6.10 or 1.8.x before 1.8.2 and is prone to integer overflow vulnerability. A flaw is present in the application, which fails to handle the dissect_xtp_ecntl function in epan/dissectors/packet-xtp.c in the XTP dissector. Succe ... oval:org.secpod.oval:def:1600294 Two flaws were found in Wireshark. If Wireshark read a malformed packet off a network or opened a malicious dump file, it could crash or, possibly, execute arbitrary code as the user running Wireshark. Several denial of service flaws were found in Wireshark. Wireshark could crash or stop responding ... oval:org.secpod.oval:def:6775 The host is installed with Wireshark 1.4.x before 1.4.15 or 1.6.x before 1.6.10 or 1.8.x before 1.8.2 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle the dissect_stun_message function in epan/dissectors/packet-stun.c in the STUN dissector. ... oval:org.secpod.oval:def:8153 The host is installed with Wireshark 1.6.x before 1.6.12 or 1.8.x before 1.8.4 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle the dissect_rtcp_app function in epan/dissectors/packet-rtcp.c in the RTCP dissector. Successful exploitation al ... oval:org.secpod.oval:def:8154 The host is installed with Wireshark 1.6.x before 1.6.12 or 1.8.x before 1.8.4 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle the dissect_wtp_common function in epan/dissectors/packet-wtp.c in the WTP dissector. Successful exploitation al ... oval:org.secpod.oval:def:8155 The host is installed with Wireshark 1.6.x before 1.6.12 or 1.8.x before 1.8.4 and is prone to integer overflow vulnerability. A flaw is present in the application, which fails to handle the dissect_iscsi_pdu function in epan/dissectors/packet-iscsi.c in the iSCSI dissector. Successful exploitation ... oval:org.secpod.oval:def:601047 Multiple vulnerabilities were discovered in the dissectors for GTPv2, ASN.1 BER, PPP CCP, DCP ETSI, MPEG DSM-CC and Websocket, which could result in denial of service or the execution of arbitrary code. The oldstable distribution is not affected. oval:org.secpod.oval:def:105875 Wireshark is a network traffic analyzer for Unix-ish operating systems. This package lays base for libpcap, a packet capture and filtering library, contains command-line utilities, contains plugins and documentation for wireshark. A graphical user interface is packaged separately to GTK+ package. oval:org.secpod.oval:def:6299 The host is installed with Wireshark 1.4.x before 1.4.13 and 1.6.x before 1.6.8 and is prone to multiple integer overflow vulnerabilities. The flaws are present in the application, which fails to handle vectors related to the BACapp and Bluetooth HCI dissectors. Successful exploitation allows remote ... oval:org.secpod.oval:def:1500433 Updated wireshark packages that fix multiple security issues are now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having Moderate security impact. Common Vulnerability Scoring System base scores, which give detailed severity ratings, are avai ... oval:org.secpod.oval:def:601055 Multiple vulnerabilities were discovered in the dissectors for CAPWAP, GMR-1 BCCH, PPP, NBAP, RDP, HTTP, DCP ETSI and in the Ixia IxVeriWave file parser, which could result in denial of service or the execution of arbitrary code. oval:org.secpod.oval:def:6297 The host is installed with Wireshark 1.4.x before 1.4.13 and 1.6.x before 1.6.8 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle vectors related to the ANSI MAP, ASF, IEEE 802.11, IEEE 802.3 and LTP dissectors. Successful exploitation allow ... oval:org.secpod.oval:def:6295 The host is installed with Wireshark 1.4.x before 1.4.13 and 1.6.x before 1.6.8 and is prone to multiple integer overflow vulnerabilities. The flaws are present in the application, which fails to handle vectors related to the BACapp and Bluetooth HCI dissectors. Successful exploitation allows remote ... oval:org.secpod.oval:def:14117 The host is installed with Wireshark 1.6.x before 1.6.16 or 1.8.x before 1.8.8 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly determine when to use a recursive approach. Successful exploitation allows attackers to cause denial of servic ... oval:org.secpod.oval:def:14115 The host is installed with Wireshark 1.6.x before 1.6.16, 1.8.x before 1.8.8 or 1.10.0 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to validate a certain fragment length value. Successful exploitation allows attackers to cause an application cras ... oval:org.secpod.oval:def:14127 The host is installed with Wireshark 1.6.x before 1.6.16 or 1.8.x before 1.8.8 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly determine when to use a recursive approach. Successful exploitation allows attackers to cause denial of servic ... oval:org.secpod.oval:def:14125 The host is installed with Wireshark 1.6.x before 1.6.16, 1.8.x before 1.8.8 or 1.10.0 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to validate a certain fragment length value. Successful exploitation allows attackers to cause an application cras ... oval:org.secpod.oval:def:203233 Wireshark is a network protocol analyzer. It is used to capture and browse the traffic running on a computer network. Multiple flaws were found in Wireshark. If Wireshark read a malformed packet off a network or opened a malicious dump file, it could crash or, possibly, execute arbitrary code as the ... oval:org.secpod.oval:def:1500299 Updated wireshark packages that fix multiple security issues, several bugs, and add various enhancements are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System base scores, wh ... oval:org.secpod.oval:def:6912 The host is installed with Wireshark 1.4.x before 1.4.15 or 1.6.x before 1.6.10 or 1.8.x before 1.8.2 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle the dissect_stun_message function in epan/dissectors/packet-stun.c in the STUN dissector. ... oval:org.secpod.oval:def:6908 The host is installed with Wireshark 1.4.x before 1.4.15 or 1.6.x before 1.6.10 or 1.8.x before 1.8.2 and is prone to integer overflow vulnerability. A flaw is present in the application, which fails to handle the dissect_xtp_ecntl function in epan/dissectors/packet-xtp.c in the XTP dissector. Succe ... oval:org.secpod.oval:def:501218 Wireshark is a network protocol analyzer. It is used to capture and browse the traffic running on a computer network. Multiple flaws were found in Wireshark. If Wireshark read a malformed packet off a network or opened a malicious dump file, it could crash or, possibly, execute arbitrary code as the ... oval:org.secpod.oval:def:500786 Wireshark is a program for monitoring network traffic. Wireshark was previously known as Ethereal. Several flaws were found in Wireshark. If Wireshark read a malformed packet off a network or opened a malicious dump file, it could crash or, possibly, execute arbitrary code as the user running Wiresh ... oval:org.secpod.oval:def:202326 Wireshark is a program for monitoring network traffic. Wireshark was previously known as Ethereal. Several flaws were found in Wireshark. If Wireshark read a malformed packet off a network or opened a malicious dump file, it could crash or, possibly, execute arbitrary code as the user running Wiresh ... |