[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250038

 
 

909

 
 

195843

 
 

282

Paid content will be excluded from the download.


Download | Alert*


oval:org.secpod.oval:def:9091
The host is installed with Wireshark 1.6.x before 1.6.13 or 1.8.x before 1.8.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle fragment gaps. Successful exploitation could allow attackers to crash the service.

oval:org.secpod.oval:def:9092
The host is installed with Wireshark 1.6.x before 1.6.13 or 1.8.x before 1.8.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle an incorrect data type for a position variable. Successful exploitation could allow attackers to cras ...

oval:org.secpod.oval:def:9093
The host is installed with Wireshark 1.6.x before 1.6.13 or 1.8.x before 1.8.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly implement certain nested loops for processing bitmap data. Successful exploitation could allow attackers to ...

oval:org.secpod.oval:def:9094
The host is installed with Wireshark 1.6.x before 1.6.13 or 1.8.x before 1.8.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle apparent Ethernet address values at the beginning of MPLS data. Successful exploitation could allow a ...

oval:org.secpod.oval:def:9090
The host is installed with Wireshark 1.6.x before 1.6.13 or 1.8.x before 1.8.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly manage an offset variable. Successful exploitation could allow attackers to crash the service.

oval:org.secpod.oval:def:9099
The host is installed with Wireshark 1.6.x before 1.6.13 or 1.8.x before 1.8.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a large number of padding bits. Successful exploitation could allow attackers to crash the service.

oval:org.secpod.oval:def:9095
The host is installed with Wireshark 1.6.x before 1.6.13 or 1.8.x before 1.8.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle offset data associated with a quoted string. Successful exploitation could allow attackers to crash t ...

oval:org.secpod.oval:def:9096
The host is installed with Wireshark 1.6.x before 1.6.13 or 1.8.x before 1.8.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly process crypto-suite parameters. Successful exploitation could allow attackers to crash the service.

oval:org.secpod.oval:def:8162
The host is installed with Wireshark 1.6.x before 1.6.12 or 1.8.x before 1.8.4 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle the epan/dissectors/packet-usb.c in the USB dissector. Successful exploitation allows remote attackers to cause ...

oval:org.secpod.oval:def:9097
The host is installed with Wireshark 1.6.x before 1.6.13 or 1.8.x before 1.8.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a certain alarm length. Successful exploitation could allow attackers to crash the service.

oval:org.secpod.oval:def:9098
The host is installed with Wireshark 1.6.x before 1.6.13 or 1.8.x before 1.8.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle an incorrect data type for a counter variable. Successful exploitation could allow attackers to crash ...

oval:org.secpod.oval:def:14124
The host is installed with Wireshark 1.6.x before 1.6.16 or 1.8.x before 1.8.8 and is prone to denial of service vulnerability. A flaw is present in the application, which incorrectly uses a -1 data value to represent an error condition. Successful exploitation allows attackers to cause an applicati ...

oval:org.secpod.oval:def:8157
The host is installed with Wireshark 1.6.x before 1.6.12 or 1.8.x before 1.8.4 and is prone to integer overflow vulnerability. A flaw is present in the application, which fails to handle the dissect_icmpv6 function in epan/dissectors/packet-icmpv6.c in the ICMPv6 dissector. Successful exploitation a ...

oval:org.secpod.oval:def:600966
Multiple vulnerabilities were discovered in the dissectors for the CLNP, DTLS, DCP-ETSI and NTLMSSP protocols, which could result in denial of service or the execution of arbitrary code.

oval:org.secpod.oval:def:9082
The host is installed with Wireshark 1.6.x before 1.6.13 or 1.8.x before 1.8.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a malformed packet. Successful exploitation could allow attackers to crash the service.

oval:org.secpod.oval:def:9083
The host is installed with Wireshark 1.6.x before 1.6.13 or 1.8.x before 1.8.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a malformed packet. Successful exploitation could allow attackers to crash the service.

oval:org.secpod.oval:def:9088
The host is installed with Wireshark 1.6.x before 1.6.13 or 1.8.x before 1.8.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which tries to access an inappropriate pointer. Successful exploitation could allow attackers to crash the service.

oval:org.secpod.oval:def:9089
The host is installed with Wireshark 1.6.x before 1.6.13 or 1.8.x before 1.8.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which tries to access an inappropriate pointer. Successful exploitation could allow attackers to crash the service.

oval:org.secpod.oval:def:8156
The host is installed with Wireshark 1.6.x before 1.6.12 or 1.8.x before 1.8.4 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle the dissect_isakmp function in epan/dissectors/packet-isakmp.c in the ISAKMP dissector. Successful exploitation ...

oval:org.secpod.oval:def:9084
The host is installed with Wireshark 1.6.x before 1.6.13 or 1.8.x before 1.8.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a malformed packet. Successful exploitation could allow attackers to crash the service.

oval:org.secpod.oval:def:9085
The host is installed with Wireshark 1.8.x before 1.8.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle unknown profiles. Successful exploitation could allow attackers to crash the service.

oval:org.secpod.oval:def:9086
The host is installed with Wireshark 1.6.x before 1.6.13 or 1.8.x before 1.8.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly determine the length of a reassembled packet for the DTLS dissector. Successful exploitation could allow att ...

oval:org.secpod.oval:def:9087
The host is installed with Wireshark 1.6.x before 1.6.13 or 1.8.x before 1.8.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly validate certain length values for the MS-MMC dissector. Successful exploitation could allow attackers to cr ...

oval:org.secpod.oval:def:600989
Multiple vulnerabilities were discovered in the dissectors for the MS-MMS, RTPS, RTPS2, Mount, ACN, CIMD and DTLS protocols, which could result in denial of service or the execution of arbitrary code.

oval:org.secpod.oval:def:9100
The host is installed with Wireshark 1.6.x before 1.6.13 or 1.8.x before 1.8.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle certain short lengths. Successful exploitation could allow attackers to crash the service.

oval:org.secpod.oval:def:600931
Bjorn Mork and Laurent Butti discovered crashes in the PPP and RTPS2 dissectors, which could potentially result in the execution of arbitrary code.

oval:org.secpod.oval:def:14134
The host is installed with Wireshark 1.6.x before 1.6.16 or 1.8.x before 1.8.8 and is prone to denial of service vulnerability. A flaw is present in the application, which incorrectly uses a -1 data value to represent an error condition. Successful exploitation allows attackers to cause an applicati ...

oval:org.secpod.oval:def:17111
The host is installed with Wireshark 1.6.x through 1.6.10 or 1.8.x through 1.8.2 and is prone to denial of service vulnerability. A flaw is present in the dissect_drda function in epan/dissectors/packet-drda.c, which fails to properly handle a small value for a certain length field in a capture file ...

oval:org.secpod.oval:def:17110
The host is installed with Wireshark 1.6.x before 1.6.15 or 1.8.x before 1.8.7 and is prone to denial of service vulnerability. A flaw is present in the fragment_add_seq_common function in epan/reassemble.c in the ASN.1 BER dissector, which fails to handle a malformed packet. Successful exploitation ...

oval:org.secpod.oval:def:9973
The host is installed with Wireshark 1.8.x before 1.8.6 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle a malformed packet. Successful exploitation allows remote attackers to cause a denial of service (application crash).

oval:org.secpod.oval:def:9972
The host is installed with Wireshark 1.8.x before 1.8.6 or 1.6.x before 1.6.14 and is prone to Integer signedness error vulnerability. A flaw is present in the application, which fails to handle a negative length value. Successful exploitation allows attackers to cause a denial of service (applicati ...

oval:org.secpod.oval:def:9975
The host is installed with Wireshark 1.8.x before 1.8.6 or 1.6.x before 1.6.14 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly manage string lengths. Successful exploitation allows remote attackers to cause a denial of service (applicati ...

oval:org.secpod.oval:def:40848
The host is installed Wireshark 1.6.0 before 1.6.15 or 1.8.x before 1.8.7 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a crafted packet-trace file that triggers a buffer overflow. Successful exploitation allows remote attacke ...

oval:org.secpod.oval:def:40845
The host is installed Wireshark 1.6.x through 1.6.10 or 1.8.x through 1.8.2 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a small value for a certain length field in a capture file. Successful exploitation allows remote attack ...

oval:org.secpod.oval:def:9971
The host is installed with Wireshark 1.8.x before 1.8.6 or 1.6.x before 1.6.14 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle a malformed packet. Successful exploitation allows attackers to cause a denial of service (infinite loop).

oval:org.secpod.oval:def:9970
The host is installed with Wireshark 1.8.x before 1.8.6 or 1.6.x before 1.6.14 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle an invalid count value in ACN_DMP_ADT_D_RE DMP data. Successful exploitation allows attackers to cause a denial ...

oval:org.secpod.oval:def:9965
The host is installed with Wireshark 1.6.x before 1.6.14 or 1.8.x before 1.8.6 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to validate the fragment offset before invoking the reassembly state machine. Successful exploitation allows remote attack ...

oval:org.secpod.oval:def:9968
The host is installed with Wireshark 1.6.x before 1.6.14 or 1.8.x before 1.8.6 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle a malformed packet. Successful exploitation allows remote attackers to cause the application to crash.

oval:org.secpod.oval:def:9969
The host is installed with 1.6.x before 1.6.14 or 1.8.x before 1.8.6 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle a malformed packet. Successful exploitation allows attackers to cause an application crash.

oval:org.secpod.oval:def:5178
The host is installed with Wireshark 1.6.x before 1.6.6 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle epan/dissectors/packet-ieee80211.c in the IEEE 802.11 dissector. Successful exploitation could allow remote attackers to cause denial o ...

oval:org.secpod.oval:def:5188
The host is installed with Wireshark 1.6.x before 1.6.6 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle epan/dissectors/packet-ieee80211.c in the IEEE 802.11 dissector. Successful exploitation could allow remote attackers to cause denial o ...

oval:org.secpod.oval:def:5180
The host is installed with Wireshark 1.4.x before 1.4.12 or 1.6.x before 1.6.6 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle the mp2t_process_fragmented_payload function in epan/dissectors/packet-mp2t.c in the MP2T dissector. Successful ...

oval:org.secpod.oval:def:5190
The host is installed with Wireshark 1.4.x before 1.4.12 or 1.6.x before 1.6.6 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle the mp2t_process_fragmented_payload function in epan/dissectors/packet-mp2t.c in the MP2T dissector. Successful ...

oval:org.secpod.oval:def:6298
The host is installed with Wireshark 1.4.x before 1.4.13 or 1.6.x before 1.6.8 and is prone to multiple integer underflow vulnerabilities. The flaws are present in the application, which fails to handle vectors related to the R3 dissector. Successful exploitation allows remote attackers to cause a d ...

oval:org.secpod.oval:def:6294
The host is installed with Wireshark 1.4.x before 1.4.13 or 1.6.x before 1.6.8 and is prone to multiple integer underflow vulnerabilities. The flaws are present in the application, which fails to handle vectors related to the R3 dissector. Successful exploitation allows remote attackers to cause a d ...

oval:org.secpod.oval:def:6300
The host is installed with Wireshark 1.4.x before 1.4.13 and 1.6.x before 1.6.8 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly construct certain array data structures. Successful exploitation allows remote attackers to cause application ...

oval:org.secpod.oval:def:6296
The host is installed with Wireshark 1.4.x before 1.4.13 and 1.6.x before 1.6.8 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly construct certain array data structures. Successful exploitation allows remote attackers to cause application ...

oval:org.secpod.oval:def:6419
The host is installed with Wireshark 1.4.x before 1.4.14 or 1.6.x before 1.6.9 or 1.8.x before 1.8.1 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle the PPP dissector. Successful exploitation allows remote attackers to cause a denial of se ...

oval:org.secpod.oval:def:6417
The host is installed with Wireshark 1.4.x before 1.4.14 or 1.6.x before 1.6.9 or 1.8.x before 1.8.1 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle the PPP dissector. Successful exploitation allows remote attackers to cause a denial of se ...

oval:org.secpod.oval:def:6420
The host is installed with Wireshark 1.4.x before 1.4.14 or 1.6.x before 1.6.9 or 1.8.x before 1.8.1 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle the epan/dissectors/packet-nfs.c in the NFS dissector. Successful exploitation allows remo ...

oval:org.secpod.oval:def:6418
The host is installed with Wireshark 1.4.x before 1.4.14 or 1.6.x before 1.6.9 or 1.8.x before 1.8.1 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle the epan/dissectors/packet-nfs.c in the NFS dissector. Successful exploitation allows remo ...

oval:org.secpod.oval:def:8167
The host is installed with Wireshark 1.6.x before 1.6.12 or 1.8.x before 1.8.4 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle the dissect_isakmp function in epan/dissectors/packet-isakmp.c in the ISAKMP dissector. Successful exploitation ...

oval:org.secpod.oval:def:8168
The host is installed with Wireshark 1.6.x before 1.6.12 or 1.8.x before 1.8.4 and is prone to integer overflow vulnerability. A flaw is present in the application, which fails to handle the dissect_icmpv6 function in epan/dissectors/packet-icmpv6.c in the ICMPv6 dissector. Successful exploitation a ...

oval:org.secpod.oval:def:8173
The host is installed with Wireshark 1.6.x before 1.6.12 or 1.8.x before 1.8.4 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle the epan/dissectors/packet-usb.c in the USB dissector. Successful exploitation allows remote attackers to cause ...

oval:org.secpod.oval:def:9101
The host is installed with Wireshark 1.6.x before 1.6.13 or 1.8.x before 1.8.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a malformed packet. Successful exploitation could allow attackers to crash the service.

oval:org.secpod.oval:def:9102
The host is installed with Wireshark 1.6.x before 1.6.13 or 1.8.x before 1.8.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a malformed packet. Successful exploitation could allow attackers to crash the service.

oval:org.secpod.oval:def:9103
The host is installed with Wireshark 1.6.x before 1.6.13 or 1.8.x before 1.8.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a malformed packet. Successful exploitation could allow attackers to crash the service.

oval:org.secpod.oval:def:9104
The host is installed with Wireshark 1.8.x before 1.8.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle unknown profiles. Successful exploitation could allow attackers to crash the service.

oval:org.secpod.oval:def:9105
The host is installed with Wireshark 1.6.x before 1.6.13 or 1.8.x before 1.8.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly determine the length of a reassembled packet for the DTLS dissector. Successful exploitation could allow att ...

oval:org.secpod.oval:def:9106
The host is installed with Wireshark 1.6.x before 1.6.13 or 1.8.x before 1.8.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly validate certain length values for the MS-MMC dissector. Successful exploitation could allow attackers to cr ...

oval:org.secpod.oval:def:9107
The host is installed with Wireshark 1.6.x before 1.6.13 or 1.8.x before 1.8.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which tries to access an inappropriate pointer. Successful exploitation could allow attackers to crash the service.

oval:org.secpod.oval:def:9108
The host is installed with Wireshark 1.6.x before 1.6.13 or 1.8.x before 1.8.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which tries to access an inappropriate pointer. Successful exploitation could allow attackers to crash the service.

oval:org.secpod.oval:def:9109
The host is installed with Wireshark 1.6.x before 1.6.13 or 1.8.x before 1.8.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly manage an offset variable. Successful exploitation could allow attackers to crash the service.

oval:org.secpod.oval:def:9110
The host is installed with Wireshark 1.6.x before 1.6.13 or 1.8.x before 1.8.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle fragment gaps. Successful exploitation could allow attackers to crash the service.

oval:org.secpod.oval:def:9111
The host is installed with Wireshark 1.6.x before 1.6.13 or 1.8.x before 1.8.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle an incorrect data type for a position variable. Successful exploitation could allow attackers to cras ...

oval:org.secpod.oval:def:9112
The host is installed with Wireshark 1.6.x before 1.6.13 or 1.8.x before 1.8.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly implement certain nested loops for processing bitmap data. Successful exploitation could allow attackers to ...

oval:org.secpod.oval:def:9113
The host is installed with Wireshark 1.6.x before 1.6.13 or 1.8.x before 1.8.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle apparent Ethernet address values at the beginning of MPLS data. Successful exploitation could allow a ...

oval:org.secpod.oval:def:9114
The host is installed with Wireshark 1.6.x before 1.6.13 or 1.8.x before 1.8.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle offset data associated with a quoted string. Successful exploitation could allow attackers to crash t ...

oval:org.secpod.oval:def:9115
The host is installed with Wireshark 1.6.x before 1.6.13 or 1.8.x before 1.8.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly process crypto-suite parameters. Successful exploitation could allow attackers to crash the service.

oval:org.secpod.oval:def:9116
The host is installed with Wireshark 1.6.x before 1.6.13 or 1.8.x before 1.8.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a certain alarm length. Successful exploitation could allow attackers to crash the service.

oval:org.secpod.oval:def:9117
The host is installed with Wireshark 1.6.x before 1.6.13 or 1.8.x before 1.8.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle an incorrect data type for a counter variable. Successful exploitation could allow attackers to crash ...

oval:org.secpod.oval:def:9118
The host is installed with Wireshark 1.6.x before 1.6.13 or 1.8.x before 1.8.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a large number of padding bits. Successful exploitation could allow attackers to crash the service.

oval:org.secpod.oval:def:9119
The host is installed with Wireshark 1.6.x before 1.6.13 or 1.8.x before 1.8.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle certain short lengths. Successful exploitation could allow attackers to crash the service.

oval:org.secpod.oval:def:9979
The host is installed with Wireshark 1.6.x before 1.6.14 or 1.8.x before 1.8.6 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to validate the fragment offset before invoking the reassembly state machine. Successful exploitation allows remote attack ...

oval:org.secpod.oval:def:9982
The host is installed with Wireshark 1.6.x before 1.6.14 or 1.8.x before 1.8.6 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle a malformed packet. Successful exploitation allows remote attackers to cause the application to crash.

oval:org.secpod.oval:def:9983
The host is installed with 1.6.x before 1.6.14 or 1.8.x before 1.8.6 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle a malformed packet. Successful exploitation allows attackers to cause an application crash.

oval:org.secpod.oval:def:9984
The host is installed with Wireshark 1.8.x before 1.8.6 or 1.6.x before 1.6.14 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle an invalid count value in ACN_DMP_ADT_D_RE DMP data. Successful exploitation allows attackers to cause a denial ...

oval:org.secpod.oval:def:9985
The host is installed with Wireshark 1.8.x before 1.8.6 or 1.6.x before 1.6.14 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle a malformed packet. Successful exploitation allows attackers to cause a denial of service (infinite loop).

oval:org.secpod.oval:def:9986
The host is installed with Wireshark 1.8.x before 1.8.6 or 1.6.x before 1.6.14 and is prone to Integer signedness error vulnerability. A flaw is present in the application, which fails to handle a negative length value. Successful exploitation allows attackers to cause a denial of service (applicati ...

oval:org.secpod.oval:def:9987
The host is installed with Wireshark 1.8.x before 1.8.6 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle a malformed packet. Successful exploitation allows remote attackers to cause a denial of service (application crash).

oval:org.secpod.oval:def:9989
The host is installed with Wireshark 1.8.x before 1.8.6 or 1.6.x before 1.6.14 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly manage string lengths. Successful exploitation allows remote attackers to cause a denial of service (applicati ...

oval:org.secpod.oval:def:5179
The host is installed with Wireshark 1.4.x before 1.4.12 or 1.6.x before 1.6.6 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle the pcap_process_pseudo_header function in wiretap/pcap-common.c. Successful exploitation could allow remote att ...

oval:org.secpod.oval:def:5176
The host is installed with Wireshark 1.4.x before 1.4.11 or 1.6.x before 1.6.5 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle the lanalyzer_read function in wiretap/lanalyzer.c. Successful exploitation could allow remote attackers to caus ...

oval:org.secpod.oval:def:600711
Laurent Butti discovered a buffer underflow in the LANalyzer dissector of the Wireshark network traffic analyzer, which could lead to the execution of arbitrary code This update also addresses several bugs, which can lead to crashes of Wireshark. These are not treated as security issues, but are fi ...

oval:org.secpod.oval:def:6780
The host is installed with Wireshark 1.6.x before 1.6.10 or 1.8.x before 1.8.2 and is prone to buffer overflow vulnerability. A flaw is present in the application, which fails to handle the dissect_gsm_rlcmac_downlink function in epan/dissectors/packet-gsm_rlcmac.c in the GSM RLC MAC dissector. Succ ...

oval:org.secpod.oval:def:5189
The host is installed with Wireshark 1.4.x before 1.4.12 or 1.6.x before 1.6.6 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle the pcap_process_pseudo_header function in wiretap/pcap-common.c. Successful exploitation could allow remote att ...

oval:org.secpod.oval:def:5186
The host is installed with Wireshark 1.4.x before 1.4.11 or 1.6.x before 1.6.5 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle the lanalyzer_read function in wiretap/lanalyzer.c. Successful exploitation could allow remote attackers to caus ...

oval:org.secpod.oval:def:6768
The host is installed with Wireshark 1.4.x before 1.4.15 or 1.6.x before 1.6.10 or 1.8.x before 1.8.2 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle the dissect_pft function in epan/dissectors/packet-dcp-etsi.c in the DCP ETSI dissector. ...

oval:org.secpod.oval:def:501147
Wireshark, previously known as Ethereal, is a network protocol analyzer. It is used to capture and browse the traffic running on a computer network. Two flaws were found in Wireshark. If Wireshark read a malformed packet off a network or opened a malicious dump file, it could crash or, possibly, exe ...

oval:org.secpod.oval:def:6774
The host is installed with Wireshark 1.4.x before 1.4.15 or 1.6.x before 1.6.10 or 1.8.x before 1.8.2 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle the CIP dissector. Successful exploitation allows remote attackers to cause a denial of s ...

oval:org.secpod.oval:def:6773
The host is installed with Wireshark 1.4.x before 1.4.15 or 1.6.x before 1.6.10 or 1.8.x before 1.8.2 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle the CTDB dissector. Successful exploitation allows remote attackers to cause a denial of ...

oval:org.secpod.oval:def:6772
The host is installed with Wireshark 1.4.x before 1.4.15 or 1.6.x before 1.6.10 or 1.8.x before 1.8.2 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle a large number of ACL entries. Successful exploitation allows remote attackers to cause a ...

oval:org.secpod.oval:def:6776
The host is installed with Wireshark 1.4.x before 1.4.15 or 1.6.x before 1.6.10 or 1.8.x before 1.8.2 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle certain integer fields. Successful exploitation allows remote attackers to cause ...

oval:org.secpod.oval:def:6779
The host is installed with Wireshark 1.4.x before 1.4.15 or 1.6.x before 1.6.10 or 1.8.x before 1.8.2 and is prone to buffer overflow vulnerability. A flaw is present in the application, which fails to handle the epan/dissectors/packet-rtps2.c in the RTPS2 dissector. Successful exploitation allows r ...

oval:org.secpod.oval:def:202528
Wireshark, previously known as Ethereal, is a network protocol analyzer. It is used to capture and browse the traffic running on a computer network. A heap-based buffer overflow flaw was found in the way Wireshark handled Endace ERF capture files. If Wireshark opened a specially-crafted ERF capture ...

oval:org.secpod.oval:def:6906
The host is installed with Wireshark 1.4.x before 1.4.15 or 1.6.x before 1.6.10 or 1.8.x before 1.8.2 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle the dissect_pft function in epan/dissectors/packet-dcp-etsi.c in the DCP ETSI dissector. ...

oval:org.secpod.oval:def:1500080
Updated wireshark packages that fix several security issues, three bugs,and add one enhancement are now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having moderatesecurity impact. Common Vulnerability Scoring System base scores,which give de ...

oval:org.secpod.oval:def:6910
The host is installed with Wireshark 1.4.x before 1.4.15 or 1.6.x before 1.6.10 or 1.8.x before 1.8.2 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle the CTDB dissector. Successful exploitation allows remote attackers to cause a denial of ...

oval:org.secpod.oval:def:6913
The host is installed with Wireshark 1.4.x before 1.4.15 or 1.6.x before 1.6.10 or 1.8.x before 1.8.2 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle certain integer fields. Successful exploitation allows remote attackers to cause ...

oval:org.secpod.oval:def:6911
The host is installed with Wireshark 1.4.x before 1.4.15 or 1.6.x before 1.6.10 or 1.8.x before 1.8.2 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle the CIP dissector. Successful exploitation allows remote attackers to cause a denial of s ...

oval:org.secpod.oval:def:6917
The host is installed with Wireshark 1.6.x before 1.6.10 or 1.8.x before 1.8.2 and is prone to buffer overflow vulnerability. A flaw is present in the application, which fails to handle the dissect_gsm_rlcmac_downlink function in epan/dissectors/packet-gsm_rlcmac.c in the GSM RLC MAC dissector. Succ ...

oval:org.secpod.oval:def:6916
The host is installed with Wireshark 1.4.x before 1.4.15 or 1.6.x before 1.6.10 or 1.8.x before 1.8.2 and is prone to buffer overflow vulnerability. A flaw is present in the application, which fails to handle the epan/dissectors/packet-rtps2.c in the RTPS2 dissector. Successful exploitation allows r ...

oval:org.secpod.oval:def:6909
The host is installed with Wireshark 1.4.x before 1.4.15 or 1.6.x before 1.6.10 or 1.8.x before 1.8.2 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle the epan/dissectors/packet-afp.c in the AFP dissector. Successful exploitation allows rem ...

oval:org.secpod.oval:def:500936
Wireshark, previously known as Ethereal, is a network protocol analyzer. It is used to capture and browse the traffic running on a computer network. A heap-based buffer overflow flaw was found in the way Wireshark handled Endace ERF capture files. If Wireshark opened a specially-crafted ERF capture ...

oval:org.secpod.oval:def:6301
The host is installed with Wireshark 1.4.x before 1.4.13 and 1.6.x before 1.6.8 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle vectors related to the ANSI MAP, ASF, IEEE 802.11, IEEE 802.3 and LTP dissectors. Successful exploitation allow ...

oval:org.secpod.oval:def:14117
The host is installed with Wireshark 1.6.x before 1.6.16 or 1.8.x before 1.8.8 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly determine when to use a recursive approach. Successful exploitation allows attackers to cause denial of servic ...

oval:org.secpod.oval:def:14115
The host is installed with Wireshark 1.6.x before 1.6.16, 1.8.x before 1.8.8 or 1.10.0 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to validate a certain fragment length value. Successful exploitation allows attackers to cause an application cras ...

oval:org.secpod.oval:def:8164
The host is installed with Wireshark 1.6.x before 1.6.12 or 1.8.x before 1.8.4 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle the dissect_rtcp_app function in epan/dissectors/packet-rtcp.c in the RTCP dissector. Successful exploitation al ...

oval:org.secpod.oval:def:8165
The host is installed with Wireshark 1.6.x before 1.6.12 or 1.8.x before 1.8.4 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle the dissect_wtp_common function in epan/dissectors/packet-wtp.c in the WTP dissector. Successful exploitation al ...

oval:org.secpod.oval:def:8166
The host is installed with Wireshark 1.6.x before 1.6.12 or 1.8.x before 1.8.4 and is prone to integer overflow vulnerability. A flaw is present in the application, which fails to handle the dissect_iscsi_pdu function in epan/dissectors/packet-iscsi.c in the iSCSI dissector. Successful exploitation ...

oval:org.secpod.oval:def:14127
The host is installed with Wireshark 1.6.x before 1.6.16 or 1.8.x before 1.8.8 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly determine when to use a recursive approach. Successful exploitation allows attackers to cause denial of servic ...

oval:org.secpod.oval:def:14125
The host is installed with Wireshark 1.6.x before 1.6.16, 1.8.x before 1.8.8 or 1.10.0 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to validate a certain fragment length value. Successful exploitation allows attackers to cause an application cras ...

oval:org.secpod.oval:def:203233
Wireshark is a network protocol analyzer. It is used to capture and browse the traffic running on a computer network. Multiple flaws were found in Wireshark. If Wireshark read a malformed packet off a network or opened a malicious dump file, it could crash or, possibly, execute arbitrary code as the ...

oval:org.secpod.oval:def:1500299
Updated wireshark packages that fix multiple security issues, several bugs, and add various enhancements are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System base scores, wh ...

oval:org.secpod.oval:def:13763
The host is installed with Wireshark 1.6.x before 1.6.15 or 1.8.x before 1.8.7 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly initialize a certain variable. Successful exploitation allows attackers to cause an application crash.

oval:org.secpod.oval:def:13770
The host is installed with Wireshark 1.6.x before 1.6.15 or 1.8.x before 1.8.7 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly initialize a certain variable. Successful exploitation allows attackers to cause an application crash.

oval:org.secpod.oval:def:6771
The host is installed with Wireshark 1.4.x before 1.4.15 or 1.6.x before 1.6.10 or 1.8.x before 1.8.2 and is prone to integer overflow vulnerability. A flaw is present in the application, which fails to handle the dissect_xtp_ecntl function in epan/dissectors/packet-xtp.c in the XTP dissector. Succe ...

oval:org.secpod.oval:def:1600294
Two flaws were found in Wireshark. If Wireshark read a malformed packet off a network or opened a malicious dump file, it could crash or, possibly, execute arbitrary code as the user running Wireshark. Several denial of service flaws were found in Wireshark. Wireshark could crash or stop responding ...

oval:org.secpod.oval:def:6775
The host is installed with Wireshark 1.4.x before 1.4.15 or 1.6.x before 1.6.10 or 1.8.x before 1.8.2 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle the dissect_stun_message function in epan/dissectors/packet-stun.c in the STUN dissector. ...

oval:org.secpod.oval:def:8153
The host is installed with Wireshark 1.6.x before 1.6.12 or 1.8.x before 1.8.4 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle the dissect_rtcp_app function in epan/dissectors/packet-rtcp.c in the RTCP dissector. Successful exploitation al ...

oval:org.secpod.oval:def:8154
The host is installed with Wireshark 1.6.x before 1.6.12 or 1.8.x before 1.8.4 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle the dissect_wtp_common function in epan/dissectors/packet-wtp.c in the WTP dissector. Successful exploitation al ...

oval:org.secpod.oval:def:8155
The host is installed with Wireshark 1.6.x before 1.6.12 or 1.8.x before 1.8.4 and is prone to integer overflow vulnerability. A flaw is present in the application, which fails to handle the dissect_iscsi_pdu function in epan/dissectors/packet-iscsi.c in the iSCSI dissector. Successful exploitation ...

oval:org.secpod.oval:def:601047
Multiple vulnerabilities were discovered in the dissectors for GTPv2, ASN.1 BER, PPP CCP, DCP ETSI, MPEG DSM-CC and Websocket, which could result in denial of service or the execution of arbitrary code. The oldstable distribution is not affected.

oval:org.secpod.oval:def:6912
The host is installed with Wireshark 1.4.x before 1.4.15 or 1.6.x before 1.6.10 or 1.8.x before 1.8.2 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle the dissect_stun_message function in epan/dissectors/packet-stun.c in the STUN dissector. ...

oval:org.secpod.oval:def:6908
The host is installed with Wireshark 1.4.x before 1.4.15 or 1.6.x before 1.6.10 or 1.8.x before 1.8.2 and is prone to integer overflow vulnerability. A flaw is present in the application, which fails to handle the dissect_xtp_ecntl function in epan/dissectors/packet-xtp.c in the XTP dissector. Succe ...

oval:org.secpod.oval:def:501218
Wireshark is a network protocol analyzer. It is used to capture and browse the traffic running on a computer network. Multiple flaws were found in Wireshark. If Wireshark read a malformed packet off a network or opened a malicious dump file, it could crash or, possibly, execute arbitrary code as the ...

oval:org.secpod.oval:def:105875
Wireshark is a network traffic analyzer for Unix-ish operating systems. This package lays base for libpcap, a packet capture and filtering library, contains command-line utilities, contains plugins and documentation for wireshark. A graphical user interface is packaged separately to GTK+ package.

oval:org.secpod.oval:def:6299
The host is installed with Wireshark 1.4.x before 1.4.13 and 1.6.x before 1.6.8 and is prone to multiple integer overflow vulnerabilities. The flaws are present in the application, which fails to handle vectors related to the BACapp and Bluetooth HCI dissectors. Successful exploitation allows remote ...

oval:org.secpod.oval:def:1500433
Updated wireshark packages that fix multiple security issues are now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having Moderate security impact. Common Vulnerability Scoring System base scores, which give detailed severity ratings, are avai ...

oval:org.secpod.oval:def:601055
Multiple vulnerabilities were discovered in the dissectors for CAPWAP, GMR-1 BCCH, PPP, NBAP, RDP, HTTP, DCP ETSI and in the Ixia IxVeriWave file parser, which could result in denial of service or the execution of arbitrary code.

oval:org.secpod.oval:def:6297
The host is installed with Wireshark 1.4.x before 1.4.13 and 1.6.x before 1.6.8 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle vectors related to the ANSI MAP, ASF, IEEE 802.11, IEEE 802.3 and LTP dissectors. Successful exploitation allow ...

oval:org.secpod.oval:def:6295
The host is installed with Wireshark 1.4.x before 1.4.13 and 1.6.x before 1.6.8 and is prone to multiple integer overflow vulnerabilities. The flaws are present in the application, which fails to handle vectors related to the BACapp and Bluetooth HCI dissectors. Successful exploitation allows remote ...

oval:org.secpod.oval:def:500786
Wireshark is a program for monitoring network traffic. Wireshark was previously known as Ethereal. Several flaws were found in Wireshark. If Wireshark read a malformed packet off a network or opened a malicious dump file, it could crash or, possibly, execute arbitrary code as the user running Wiresh ...

oval:org.secpod.oval:def:202326
Wireshark is a program for monitoring network traffic. Wireshark was previously known as Ethereal. Several flaws were found in Wireshark. If Wireshark read a malformed packet off a network or opened a malicious dump file, it could crash or, possibly, execute arbitrary code as the user running Wiresh ...

CVE    58
CVE-2013-1576
CVE-2013-1575
CVE-2013-1578
CVE-2013-1577
...
*CPE
cpe:/a:wireshark:wireshark:1.6.5

© SecPod Technologies