Download
| Alert*
oval:org.secpod.oval:def:17099
The host is installed with Wireshark 1.8.x before 1.8.9 or 1.10.x before 1.10.1 and is prone to denial of service vulnerability. A flaw is present in the dissect_dvbci_tpdu_hdr function in epan/dissectors/packet-dvbci.c in the DVB-CI dissector in wireshark, which does not validate a certain length v ... oval:org.secpod.oval:def:106071 Wireshark is a network traffic analyzer for Unix-ish operating systems. This package lays base for libpcap, a packet capture and filtering library, contains command-line utilities, contains plugins and documentation for wireshark. A graphical user interface is packaged separately to GTK+ package. oval:org.secpod.oval:def:106093 Wireshark is a network traffic analyzer for Unix-ish operating systems. This package lays base for libpcap, a packet capture and filtering library, contains command-line utilities, contains plugins and documentation for wireshark. A graphical user interface is packaged separately to GTK+ package. oval:org.secpod.oval:def:8160 The host is installed with Wireshark 1.8.x before 1.8.4 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle the epan/dissectors/packet-3g-a11.c in the 3GPP2 A11 dissector. Successful exploitation allows remote attackers to cause a denial of se ... oval:org.secpod.oval:def:8161 The host is installed with Wireshark 1.8.x before 1.8.4 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle the dissect_sflow_245_address_type function in epan/dissectors/packet-sflow.c in the sFlow dissector. Successful exploitation allows re ... oval:org.secpod.oval:def:8162 The host is installed with Wireshark 1.6.x before 1.6.12 or 1.8.x before 1.8.4 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle the epan/dissectors/packet-usb.c in the USB dissector. Successful exploitation allows remote attackers to cause ... oval:org.secpod.oval:def:8163 The host is installed with Wireshark 1.8.x before 1.8.4 and is prone to information disclosure vulnerability. A flaw is present in the application, which fails to handle the read operation on the pcap-ng files. Successful exploitation allows remote attackers to obtain sensitive hostname information. oval:org.secpod.oval:def:14852 The host is installed with Wireshark 1.8.x before 1.8.9 or 1.10.x before 1.10.1 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to terminate packet-data processing after finding zero remaining bytes. Successful exploitation allows attackers to cause ... oval:org.secpod.oval:def:601142 Multiple vulnerabilities were discovered in the dissectors for IEEE 802.15.4, NBAP, SIP and TCP, which could result in denial of service. The oldstable distribution is only affected by CVE-2013-6340. This problem has been fixed in version 1.2.11-6+squeeze13. oval:org.secpod.oval:def:16004 The host is installed with Wireshark 1.8.x before 1.8.11 or 1.10.x before 1.10.3 and is prone to spoofing vulnerability. The flaw is present in the ieee802154_map_rec function in epan/dissectors/packet-ieee802154.c in the IEEE 802.15.4 dissecto, which fails to properly handle a crafted packet. Succe ... oval:org.secpod.oval:def:16005 The host is installed with Wireshark 1.8.x before 1.8.11 or 1.10.x before 1.10.3 and is prone to denial of service vulnerability. The flaw is present in the epan/dissectors/packet-tcp.c in the TCP dissector, which does not properly determine the amount of remaining data. Successful exploitation allo ... oval:org.secpod.oval:def:16002 The host is installed with Wireshark 1.8.x before 1.8.11 or 1.10.x before 1.10.3 and is prone to denial of service vulnerability. The flaw is present in the dissect_sip_common function in epan/dissectors/packet-sip.c in the SIP dissector, which fails to properly initialize a data structure. Successf ... oval:org.secpod.oval:def:16003 The host is installed with Wireshark 1.8.x before 1.8.11 or 1.10.x before 1.10.3 and is prone to unspecified vulnerability. The flaw is present in the in the NBAP dissector, which fails to handle a crafted packet. Successful exploitation allows remote attackers to cause a denial of service (applicat ... oval:org.secpod.oval:def:16008 The host is installed with Wireshark 1.8.x before 1.8.11 or 1.10.x before 1.10.3 and is prone to unspecified vulnerability. The flaw is present in the in the NBAP dissector, which fails to handle a crafted packet. Successful exploitation allows remote attackers to cause a denial of service (applicat ... oval:org.secpod.oval:def:8157 The host is installed with Wireshark 1.6.x before 1.6.12 or 1.8.x before 1.8.4 and is prone to integer overflow vulnerability. A flaw is present in the application, which fails to handle the dissect_icmpv6 function in epan/dissectors/packet-icmpv6.c in the ICMPv6 dissector. Successful exploitation a ... oval:org.secpod.oval:def:16009 The host is installed with Wireshark 1.8.x before 1.8.11 or 1.10.x before 1.10.3 and is prone to spoofing vulnerability. The flaw is present in the ieee802154_map_rec function in epan/dissectors/packet-ieee802154.c in the IEEE 802.15.4 dissecto, which fails to properly handle a crafted packet. Succe ... oval:org.secpod.oval:def:8158 The host is installed with Wireshark 1.8.x before 1.8.4 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle the dissect_eigrp_metric_comm function in epan/dissectors/packet-eigrp.c in the EIGRP dissector. Successful exploitation allows remote ... oval:org.secpod.oval:def:16006 The host is installed with Wireshark 1.8.x before 1.8.11 or 1.10.x before 1.10.3 and is prone to denial of service vulnerability. The flaw is present in the dissect_openwire_type function in epan/dissectors/packet-openwire.c in the OpenWire dissector, which fails to properly handle a crafted packet. ... oval:org.secpod.oval:def:16007 The host is installed with Wireshark 1.8.x before 1.8.11 or 1.10.x before 1.10.3 and is prone to denial of service vulnerability. The flaw is present in the dissect_sip_common function in epan/dissectors/packet-sip.c in the SIP dissector, which fails to properly initialize a data structure. Successf ... oval:org.secpod.oval:def:16000 The host is installed with Wireshark 1.8.x before 1.8.11 or 1.10.x before 1.10.3 and is prone to denial of service vulnerability. The flaw is present in the epan/dissectors/packet-tcp.c in the TCP dissector, which does not properly determine the amount of remaining data. Successful exploitation allo ... oval:org.secpod.oval:def:16001 The host is installed with Wireshark 1.8.x before 1.8.11 or 1.10.x before 1.10.3 and is prone to denial of service vulnerability. The flaw is present in the dissect_openwire_type function in epan/dissectors/packet-openwire.c in the OpenWire dissector, which fails to properly handle a crafted packet. ... oval:org.secpod.oval:def:600966 Multiple vulnerabilities were discovered in the dissectors for the CLNP, DTLS, DCP-ETSI and NTLMSSP protocols, which could result in denial of service or the execution of arbitrary code. oval:org.secpod.oval:def:8156 The host is installed with Wireshark 1.6.x before 1.6.12 or 1.8.x before 1.8.4 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle the dissect_isakmp function in epan/dissectors/packet-isakmp.c in the ISAKMP dissector. Successful exploitation ... oval:org.secpod.oval:def:600989 Multiple vulnerabilities were discovered in the dissectors for the MS-MMS, RTPS, RTPS2, Mount, ACN, CIMD and DTLS protocols, which could result in denial of service or the execution of arbitrary code. oval:org.secpod.oval:def:9100 The host is installed with Wireshark 1.6.x before 1.6.13 or 1.8.x before 1.8.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle certain short lengths. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:601172 Laurent Butti and Garming Sam discored multiple vulnerabilities in the dissectors for NTLMSSPv2 and BSSGP, which could lead to denial of service or the execution of arbitrary code. oval:org.secpod.oval:def:14116 The host is installed with Wireshark 1.8.x before 1.8.8 and is prone to heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to validate the relationship between a record length and a trailer length. Successful exploitation allows attackers to cause a denial of ... oval:org.secpod.oval:def:9091 The host is installed with Wireshark 1.6.x before 1.6.13 or 1.8.x before 1.8.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle fragment gaps. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:9092 The host is installed with Wireshark 1.6.x before 1.6.13 or 1.8.x before 1.8.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle an incorrect data type for a position variable. Successful exploitation could allow attackers to cras ... oval:org.secpod.oval:def:9093 The host is installed with Wireshark 1.6.x before 1.6.13 or 1.8.x before 1.8.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly implement certain nested loops for processing bitmap data. Successful exploitation could allow attackers to ... oval:org.secpod.oval:def:9094 The host is installed with Wireshark 1.6.x before 1.6.13 or 1.8.x before 1.8.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle apparent Ethernet address values at the beginning of MPLS data. Successful exploitation could allow a ... oval:org.secpod.oval:def:9090 The host is installed with Wireshark 1.6.x before 1.6.13 or 1.8.x before 1.8.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly manage an offset variable. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:9099 The host is installed with Wireshark 1.6.x before 1.6.13 or 1.8.x before 1.8.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a large number of padding bits. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:9095 The host is installed with Wireshark 1.6.x before 1.6.13 or 1.8.x before 1.8.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle offset data associated with a quoted string. Successful exploitation could allow attackers to crash t ... oval:org.secpod.oval:def:9096 The host is installed with Wireshark 1.6.x before 1.6.13 or 1.8.x before 1.8.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly process crypto-suite parameters. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:9097 The host is installed with Wireshark 1.6.x before 1.6.13 or 1.8.x before 1.8.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a certain alarm length. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:9098 The host is installed with Wireshark 1.6.x before 1.6.13 or 1.8.x before 1.8.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle an incorrect data type for a counter variable. Successful exploitation could allow attackers to crash ... oval:org.secpod.oval:def:14123 The host is installed with Wireshark 1.8.x before 1.8.8 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly initialize memory. Successful exploitation allows attackers to cause an application crash. oval:org.secpod.oval:def:14124 The host is installed with Wireshark 1.6.x before 1.6.16 or 1.8.x before 1.8.8 and is prone to denial of service vulnerability. A flaw is present in the application, which incorrectly uses a -1 data value to represent an error condition. Successful exploitation allows attackers to cause an applicati ... oval:org.secpod.oval:def:14121 The host is installed with Wireshark 1.8.x before 1.8.8 and is prone to array index error vulnerability. A flaw is present in the application, which fails to handle vectors related to nbap.cnf and packet-nbap.c. Successful exploitation allows attackers to cause an application crash. oval:org.secpod.oval:def:14122 The host is installed with Wireshark 1.8.x before 1.8.8 and is prone to buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted packet. Successful exploitation allows attackers to cause an application crash. oval:org.secpod.oval:def:14120 The host is installed with Wireshark 1.8.x before 1.8.8 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to validate return values during checks for data availability. Successful exploitation allows attackers to cause an application crash. oval:org.secpod.oval:def:14118 The host is installed with Wireshark 1.8.x before 1.8.8 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle a zero-length item. Successful exploitation allows attackers to cause a denial of service (infinite loop, and CPU and memory c ... oval:org.secpod.oval:def:14119 The host is installed with Wireshark 1.8.x before 1.8.8 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle a crafted packet. Successful exploitation allows attackers to cause a denial of service (infinite loop and application hang). oval:org.secpod.oval:def:9082 The host is installed with Wireshark 1.6.x before 1.6.13 or 1.8.x before 1.8.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a malformed packet. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:9083 The host is installed with Wireshark 1.6.x before 1.6.13 or 1.8.x before 1.8.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a malformed packet. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:9088 The host is installed with Wireshark 1.6.x before 1.6.13 or 1.8.x before 1.8.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which tries to access an inappropriate pointer. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:9089 The host is installed with Wireshark 1.6.x before 1.6.13 or 1.8.x before 1.8.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which tries to access an inappropriate pointer. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:9084 The host is installed with Wireshark 1.6.x before 1.6.13 or 1.8.x before 1.8.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a malformed packet. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:9085 The host is installed with Wireshark 1.8.x before 1.8.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle unknown profiles. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:9086 The host is installed with Wireshark 1.6.x before 1.6.13 or 1.8.x before 1.8.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly determine the length of a reassembled packet for the DTLS dissector. Successful exploitation could allow att ... oval:org.secpod.oval:def:9087 The host is installed with Wireshark 1.6.x before 1.6.13 or 1.8.x before 1.8.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly validate certain length values for the MS-MMC dissector. Successful exploitation could allow attackers to cr ... oval:org.secpod.oval:def:40858 The host is installed Wireshark 1.8.x before 1.8.9 or 1.10.x before 1.10.1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly determine whether there is remaining packet data to process. Successful exploitation allows remote attackers to ... oval:org.secpod.oval:def:40859 The host is installed Wireshark 1.8.x before 1.8.9 or 1.10.x before 1.10.1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly determine whether there is remaining packet data to process. Successful exploitation allows remote attackers to ... oval:org.secpod.oval:def:15586 The host is installed with Wireshark 1.8.x before 1.8.10 or 1.10.x before 1.10.2 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to restrict the dch_id value. Successful exploitation allows attackers to cause application crash. oval:org.secpod.oval:def:601105 Multiple vulnerabilities were discovered in the dissectors for LDAP, RTPS and NBAP and in the Netmon file parser, which could result in denial of service or the execution of arbitrary code. oval:org.secpod.oval:def:16432 The host is installed with Wireshark 1.8.x before 1.8.12 or 1.10.x before 1.10.4 and is prone to multiple buffer overflow vulnerabilities. The flaws are present in the application, which fails to handle a long domain name in a packet. Successful exploitation allows attackers to cause application cra ... oval:org.secpod.oval:def:16435 The host is installed with Wireshark 1.8.x before 1.8.12 or 1.10.x before 1.10.4 and is prone to multiple buffer overflow vulnerabilities. The flaws are present in the application, which fails to handle a long domain name in a packet. Successful exploitation allows attackers to cause application cra ... oval:org.secpod.oval:def:15588 The host is installed with Wireshark 1.8.x before 1.8.10 or 1.10.x before 1.10.2 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle crafted packet. Successful exploitation allows attackers to cause application crash. oval:org.secpod.oval:def:15589 The host is installed with Wireshark 1.8.x before 1.8.10 or 1.10.x before 1.10.2 and is prone to buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted packet. Successful exploitation allows attackers to cause application crash. oval:org.secpod.oval:def:15597 The host is installed with Wireshark 1.8.x before 1.8.10 or 1.10.x before 1.10.2 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to properly handle crafted packet. Successful exploitation allows attackers to cause application crash. oval:org.secpod.oval:def:7303 The host is installed with Wireshark 1.8.x before 1.8.3 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle the dissect_hsrp function in epan/dissectors/packet-hsrp.c in the HSRP dissector. Successful exploitation allows remote attack ... oval:org.secpod.oval:def:15595 The host is installed with Wireshark 1.8.x before 1.8.10 or 1.10.x before 1.10.2 and is prone to buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted packet. Successful exploitation allows attackers to cause application crash. oval:org.secpod.oval:def:7301 The host is installed with Wireshark 1.8.x before 1.8.3 and is prone to buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle the dissect_tlv function in epan/dissectors/packet-ldp.c in the LDP dissector. Successful exploitation allows remote attackers t ... oval:org.secpod.oval:def:7302 The host is installed with Wireshark 1.8.x before 1.8.3 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle OUI data structures. Successful exploitation allows remote attackers to cause a denial of service (assertion failure and appli ... oval:org.secpod.oval:def:15593 The host is installed with Wireshark 1.8.x before 1.8.10 or 1.10.x before 1.10.2 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to restrict the dch_id value. Successful exploitation allows attackers to cause application crash. oval:org.secpod.oval:def:15594 The host is installed with Wireshark 1.8.x before 1.8.10 or 1.10.x before 1.10.2 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle crafted packet. Successful exploitation allows attackers to cause application crash. oval:org.secpod.oval:def:15591 The host is installed with Wireshark 1.8.x before 1.8.10 or 1.10.x before 1.10.2 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to properly handle crafted packet. Successful exploitation allows attackers to cause application crash. oval:org.secpod.oval:def:14128 The host is installed with Wireshark 1.8.x before 1.8.8 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle a zero-length item. Successful exploitation allows attackers to cause a denial of service (infinite loop, and CPU and memory c ... oval:org.secpod.oval:def:14126 The host is installed with Wireshark 1.8.x before 1.8.8 and is prone to heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to validate the relationship between a record length and a trailer length. Successful exploitation allows attackers to cause a denial of ... oval:org.secpod.oval:def:14134 The host is installed with Wireshark 1.6.x before 1.6.16 or 1.8.x before 1.8.8 and is prone to denial of service vulnerability. A flaw is present in the application, which incorrectly uses a -1 data value to represent an error condition. Successful exploitation allows attackers to cause an applicati ... oval:org.secpod.oval:def:14132 The host is installed with Wireshark 1.8.x before 1.8.8 and is prone to buffer overflow vulnerability. A flaw is present in the application, which fails to handle a crafted packet. Successful exploitation allows attackers to cause an application crash. oval:org.secpod.oval:def:14133 The host is installed with Wireshark 1.8.x before 1.8.8 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly initialize memory. Successful exploitation allows attackers to cause an application crash. oval:org.secpod.oval:def:14130 The host is installed with Wireshark 1.8.x before 1.8.8 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to validate return values during checks for data availability. Successful exploitation allows attackers to cause an application crash. oval:org.secpod.oval:def:14131 The host is installed with Wireshark 1.8.x before 1.8.8 and is prone to array index error vulnerability. A flaw is present in the application, which fails to handle vectors related to nbap.cnf and packet-nbap.c. Successful exploitation allows attackers to cause an application crash. oval:org.secpod.oval:def:14129 The host is installed with Wireshark 1.8.x before 1.8.8 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle a crafted packet. Successful exploitation allows attackers to cause a denial of service (infinite loop and application hang). oval:org.secpod.oval:def:17111 The host is installed with Wireshark 1.6.x through 1.6.10 or 1.8.x through 1.8.2 and is prone to denial of service vulnerability. A flaw is present in the dissect_drda function in epan/dissectors/packet-drda.c, which fails to properly handle a small value for a certain length field in a capture file ... oval:org.secpod.oval:def:17110 The host is installed with Wireshark 1.6.x before 1.6.15 or 1.8.x before 1.8.7 and is prone to denial of service vulnerability. A flaw is present in the fragment_add_seq_common function in epan/reassemble.c in the ASN.1 BER dissector, which fails to handle a malformed packet. Successful exploitation ... oval:org.secpod.oval:def:9977 The host is installed with Wireshark 1.8.x before 1.8.6 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle a packet with a header that is too short. Successful exploitation allows remote attackers to cause a denial of service (infinite loop). oval:org.secpod.oval:def:9976 The host is installed with Wireshark 1.8.x before 1.8.6 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly manage function pointers. Successful exploitation allows remote attackers to cause a denial of service (application crash) via a malf ... oval:org.secpod.oval:def:9978 The host is installed with Wireshark 1.8.x before 1.8.6 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle a malformed packet. Successful exploitation allows remote attackers to cause a denial of service (application crash). oval:org.secpod.oval:def:9973 The host is installed with Wireshark 1.8.x before 1.8.6 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle a malformed packet. Successful exploitation allows remote attackers to cause a denial of service (application crash). oval:org.secpod.oval:def:9972 The host is installed with Wireshark 1.8.x before 1.8.6 or 1.6.x before 1.6.14 and is prone to Integer signedness error vulnerability. A flaw is present in the application, which fails to handle a negative length value. Successful exploitation allows attackers to cause a denial of service (applicati ... oval:org.secpod.oval:def:9975 The host is installed with Wireshark 1.8.x before 1.8.6 or 1.6.x before 1.6.14 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly manage string lengths. Successful exploitation allows remote attackers to cause a denial of service (applicati ... oval:org.secpod.oval:def:9974 The host is installed with Wireshark 1.8.x before 1.8.6 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle invalid Sub-tlv data. Successful exploitation allows attackers to cause denial of service (infinite loop). oval:org.secpod.oval:def:40848 The host is installed Wireshark 1.6.0 before 1.6.15 or 1.8.x before 1.8.7 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a crafted packet-trace file that triggers a buffer overflow. Successful exploitation allows remote attacke ... oval:org.secpod.oval:def:40845 The host is installed Wireshark 1.6.x through 1.6.10 or 1.8.x through 1.8.2 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a small value for a certain length field in a capture file. Successful exploitation allows remote attack ... oval:org.secpod.oval:def:9971 The host is installed with Wireshark 1.8.x before 1.8.6 or 1.6.x before 1.6.14 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle a malformed packet. Successful exploitation allows attackers to cause a denial of service (infinite loop). oval:org.secpod.oval:def:9970 The host is installed with Wireshark 1.8.x before 1.8.6 or 1.6.x before 1.6.14 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle an invalid count value in ACN_DMP_ADT_D_RE DMP data. Successful exploitation allows attackers to cause a denial ... oval:org.secpod.oval:def:9966 The host is installed with Wireshark 1.8.x before 1.8.6 and is prone to denial of service vulnerability. A flaw is present in the application, which uses incorrect integer data types. successful exploitation allows remote attackers to cause a denial of service (infinite loop) via crafted integer val ... oval:org.secpod.oval:def:9965 The host is installed with Wireshark 1.6.x before 1.6.14 or 1.8.x before 1.8.6 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to validate the fragment offset before invoking the reassembly state machine. Successful exploitation allows remote attack ... oval:org.secpod.oval:def:9968 The host is installed with Wireshark 1.6.x before 1.6.14 or 1.8.x before 1.8.6 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle a malformed packet. Successful exploitation allows remote attackers to cause the application to crash. oval:org.secpod.oval:def:9967 The host is installed with Wireshark 1.8.x before 1.8.6 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle crafted integer values in a packet. Successful exploitation allows remote attackers to cause a denial of service (infinite loop). oval:org.secpod.oval:def:9969 The host is installed with 1.6.x before 1.6.14 or 1.8.x before 1.8.6 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle a malformed packet. Successful exploitation allows attackers to cause an application crash. oval:org.secpod.oval:def:204662 The wireshark packages contain a network protocol analyzer used to capture and browse the traffic running on a computer network. Security Fix: * Several denial of service flaws were found in Wireshark. Wireshark could crash or stop responding if it read a malformed packet off a network, or opened a ... oval:org.secpod.oval:def:17061 The host is installed with Wireshark 1.10.0 before 1.10.6 or 1.8.0 before 1.8.13 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a malformed packet trace file. Successful exploitation could allow attackers to make Wireshark cras ... oval:org.secpod.oval:def:17053 The host is installed with Wireshark 1.10.0 before 1.10.6 or 1.8.0 before 1.8.13 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a malformed packet trace file. Successful exploitation could allow attackers to make Wireshark cras ... oval:org.secpod.oval:def:1600523 Several denial of service flaws were found in Wireshark. Wireshark could crash or stop responding if it read a malformed packet off a network, or opened a malicious dump file. oval:org.secpod.oval:def:1501813 The wireshark packages contain a network protocol analyzer used to capture and browse the traffic running on a computer network. Security Fix: * Several denial of service flaws were found in Wireshark. Wireshark could crash or stop responding if it read a malformed packet off a network, or opened a ... oval:org.secpod.oval:def:502001 The wireshark packages contain a network protocol analyzer used to capture and browse the traffic running on a computer network. Security Fix: * Several denial of service flaws were found in Wireshark. Wireshark could crash or stop responding if it read a malformed packet off a network, or opened a ... oval:org.secpod.oval:def:7304 The host is installed with Wireshark 1.8.x before 1.8.3 and is prone to buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle the dissect_tlv function in epan/dissectors/packet-ldp.c in the LDP dissector. Successful exploitation allows remote attackers t ... oval:org.secpod.oval:def:7305 The host is installed with Wireshark 1.8.x before 1.8.3 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle OUI data structures. Successful exploitation allows remote attackers to cause a denial of service (assertion failure and appli ... oval:org.secpod.oval:def:7306 The host is installed with Wireshark 1.8.x before 1.8.3 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle the dissect_hsrp function in epan/dissectors/packet-hsrp.c in the HSRP dissector. Successful exploitation allows remote attack ... oval:org.secpod.oval:def:8167 The host is installed with Wireshark 1.6.x before 1.6.12 or 1.8.x before 1.8.4 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle the dissect_isakmp function in epan/dissectors/packet-isakmp.c in the ISAKMP dissector. Successful exploitation ... oval:org.secpod.oval:def:8168 The host is installed with Wireshark 1.6.x before 1.6.12 or 1.8.x before 1.8.4 and is prone to integer overflow vulnerability. A flaw is present in the application, which fails to handle the dissect_icmpv6 function in epan/dissectors/packet-icmpv6.c in the ICMPv6 dissector. Successful exploitation a ... oval:org.secpod.oval:def:8169 The host is installed with Wireshark 1.8.x before 1.8.4 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle the dissect_eigrp_metric_comm function in epan/dissectors/packet-eigrp.c in the EIGRP dissector. Successful exploitation allows remote ... oval:org.secpod.oval:def:8171 The host is installed with Wireshark 1.8.x before 1.8.4 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle the epan/dissectors/packet-3g-a11.c in the 3GPP2 A11 dissector. Successful exploitation allows remote attackers to cause a denial of se ... oval:org.secpod.oval:def:8172 The host is installed with Wireshark 1.8.x before 1.8.4 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle the dissect_sflow_245_address_type function in epan/dissectors/packet-sflow.c in the sFlow dissector. Successful exploitation allows re ... oval:org.secpod.oval:def:8173 The host is installed with Wireshark 1.6.x before 1.6.12 or 1.8.x before 1.8.4 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle the epan/dissectors/packet-usb.c in the USB dissector. Successful exploitation allows remote attackers to cause ... oval:org.secpod.oval:def:8174 The host is installed with Wireshark 1.8.x before 1.8.4 and is prone to information disclosure vulnerability. A flaw is present in the application, which fails to handle the read operation on the pcap-ng files. Successful exploitation allows remote attackers to obtain sensitive hostname information. oval:org.secpod.oval:def:9101 The host is installed with Wireshark 1.6.x before 1.6.13 or 1.8.x before 1.8.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a malformed packet. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:9102 The host is installed with Wireshark 1.6.x before 1.6.13 or 1.8.x before 1.8.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a malformed packet. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:9103 The host is installed with Wireshark 1.6.x before 1.6.13 or 1.8.x before 1.8.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a malformed packet. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:9104 The host is installed with Wireshark 1.8.x before 1.8.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle unknown profiles. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:9105 The host is installed with Wireshark 1.6.x before 1.6.13 or 1.8.x before 1.8.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly determine the length of a reassembled packet for the DTLS dissector. Successful exploitation could allow att ... oval:org.secpod.oval:def:9106 The host is installed with Wireshark 1.6.x before 1.6.13 or 1.8.x before 1.8.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly validate certain length values for the MS-MMC dissector. Successful exploitation could allow attackers to cr ... oval:org.secpod.oval:def:9107 The host is installed with Wireshark 1.6.x before 1.6.13 or 1.8.x before 1.8.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which tries to access an inappropriate pointer. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:9108 The host is installed with Wireshark 1.6.x before 1.6.13 or 1.8.x before 1.8.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which tries to access an inappropriate pointer. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:9109 The host is installed with Wireshark 1.6.x before 1.6.13 or 1.8.x before 1.8.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly manage an offset variable. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:9110 The host is installed with Wireshark 1.6.x before 1.6.13 or 1.8.x before 1.8.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle fragment gaps. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:9111 The host is installed with Wireshark 1.6.x before 1.6.13 or 1.8.x before 1.8.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle an incorrect data type for a position variable. Successful exploitation could allow attackers to cras ... oval:org.secpod.oval:def:9112 The host is installed with Wireshark 1.6.x before 1.6.13 or 1.8.x before 1.8.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly implement certain nested loops for processing bitmap data. Successful exploitation could allow attackers to ... oval:org.secpod.oval:def:9113 The host is installed with Wireshark 1.6.x before 1.6.13 or 1.8.x before 1.8.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle apparent Ethernet address values at the beginning of MPLS data. Successful exploitation could allow a ... oval:org.secpod.oval:def:9114 The host is installed with Wireshark 1.6.x before 1.6.13 or 1.8.x before 1.8.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle offset data associated with a quoted string. Successful exploitation could allow attackers to crash t ... oval:org.secpod.oval:def:9115 The host is installed with Wireshark 1.6.x before 1.6.13 or 1.8.x before 1.8.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly process crypto-suite parameters. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:9116 The host is installed with Wireshark 1.6.x before 1.6.13 or 1.8.x before 1.8.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a certain alarm length. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:9117 The host is installed with Wireshark 1.6.x before 1.6.13 or 1.8.x before 1.8.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle an incorrect data type for a counter variable. Successful exploitation could allow attackers to crash ... oval:org.secpod.oval:def:9118 The host is installed with Wireshark 1.6.x before 1.6.13 or 1.8.x before 1.8.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a large number of padding bits. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:9119 The host is installed with Wireshark 1.6.x before 1.6.13 or 1.8.x before 1.8.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle certain short lengths. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:9979 The host is installed with Wireshark 1.6.x before 1.6.14 or 1.8.x before 1.8.6 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to validate the fragment offset before invoking the reassembly state machine. Successful exploitation allows remote attack ... oval:org.secpod.oval:def:9980 The host is installed with Wireshark 1.8.x before 1.8.6 and is prone to denial of service vulnerability. A flaw is present in the application, which uses incorrect integer data types. successful exploitation allows remote attackers to cause a denial of service (infinite loop) via crafted integer val ... oval:org.secpod.oval:def:9981 The host is installed with Wireshark 1.8.x before 1.8.6 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle crafted integer values in a packet. Successful exploitation allows remote attackers to cause a denial of service (infinite loop). oval:org.secpod.oval:def:9982 The host is installed with Wireshark 1.6.x before 1.6.14 or 1.8.x before 1.8.6 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle a malformed packet. Successful exploitation allows remote attackers to cause the application to crash. oval:org.secpod.oval:def:9983 The host is installed with 1.6.x before 1.6.14 or 1.8.x before 1.8.6 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle a malformed packet. Successful exploitation allows attackers to cause an application crash. oval:org.secpod.oval:def:9984 The host is installed with Wireshark 1.8.x before 1.8.6 or 1.6.x before 1.6.14 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle an invalid count value in ACN_DMP_ADT_D_RE DMP data. Successful exploitation allows attackers to cause a denial ... oval:org.secpod.oval:def:9985 The host is installed with Wireshark 1.8.x before 1.8.6 or 1.6.x before 1.6.14 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle a malformed packet. Successful exploitation allows attackers to cause a denial of service (infinite loop). oval:org.secpod.oval:def:9986 The host is installed with Wireshark 1.8.x before 1.8.6 or 1.6.x before 1.6.14 and is prone to Integer signedness error vulnerability. A flaw is present in the application, which fails to handle a negative length value. Successful exploitation allows attackers to cause a denial of service (applicati ... oval:org.secpod.oval:def:9987 The host is installed with Wireshark 1.8.x before 1.8.6 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle a malformed packet. Successful exploitation allows remote attackers to cause a denial of service (application crash). oval:org.secpod.oval:def:9988 The host is installed with Wireshark 1.8.x before 1.8.6 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle invalid Sub-tlv data. Successful exploitation allows attackers to cause denial of service (infinite loop). oval:org.secpod.oval:def:9989 The host is installed with Wireshark 1.8.x before 1.8.6 or 1.6.x before 1.6.14 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly manage string lengths. Successful exploitation allows remote attackers to cause a denial of service (applicati ... oval:org.secpod.oval:def:9990 The host is installed with Wireshark 1.8.x before 1.8.6 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly manage function pointers. Successful exploitation allows remote attackers to cause a denial of service (application crash) via a malf ... oval:org.secpod.oval:def:9991 The host is installed with Wireshark 1.8.x before 1.8.6 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle a packet with a header that is too short. Successful exploitation allows remote attackers to cause a denial of service (infinite loop). oval:org.secpod.oval:def:9992 The host is installed with Wireshark 1.8.x before 1.8.6 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle a malformed packet. Successful exploitation allows remote attackers to cause a denial of service (application crash). oval:org.secpod.oval:def:501147 Wireshark, previously known as Ethereal, is a network protocol analyzer. It is used to capture and browse the traffic running on a computer network. Two flaws were found in Wireshark. If Wireshark read a malformed packet off a network or opened a malicious dump file, it could crash or, possibly, exe ... oval:org.secpod.oval:def:106187 Wireshark is a network traffic analyzer for Unix-ish operating systems. This package lays base for libpcap, a packet capture and filtering library, contains command-line utilities, contains plugins and documentation for wireshark. A graphical user interface is packaged separately to GTK+ package. oval:org.secpod.oval:def:106509 Wireshark is a network traffic analyzer for Unix-ish operating systems. This package lays base for libpcap, a packet capture and filtering library, contains command-line utilities, contains plugins and documentation for wireshark. A graphical user interface is packaged separately to GTK+ package. oval:org.secpod.oval:def:17100 The host is installed with Wireshark 1.8.x before 1.8.9 or 1.10.x before 1.10.1 and is prone to integer signedness error vulnerability. A flaw is present in the get_type_length function in epan/dissectors/packet-btsdp.c in the Bluetooth SDP dissector in Wireshark, which fails to properly handle a cr ... oval:org.secpod.oval:def:8164 The host is installed with Wireshark 1.6.x before 1.6.12 or 1.8.x before 1.8.4 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle the dissect_rtcp_app function in epan/dissectors/packet-rtcp.c in the RTCP dissector. Successful exploitation al ... oval:org.secpod.oval:def:8165 The host is installed with Wireshark 1.6.x before 1.6.12 or 1.8.x before 1.8.4 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle the dissect_wtp_common function in epan/dissectors/packet-wtp.c in the WTP dissector. Successful exploitation al ... oval:org.secpod.oval:def:8166 The host is installed with Wireshark 1.6.x before 1.6.12 or 1.8.x before 1.8.4 and is prone to integer overflow vulnerability. A flaw is present in the application, which fails to handle the dissect_iscsi_pdu function in epan/dissectors/packet-iscsi.c in the iSCSI dissector. Successful exploitation ... oval:org.secpod.oval:def:8170 The host is installed with Wireshark 1.8.x before 1.8.4 and is prone to integer overflow vulnerability. A flaw is present in the application, which fails to handle the dissect_sack_chunk function in epan/dissectors/packet-sctp.c in the SCTP dissector. Successful exploitation allows remote attackers ... oval:org.secpod.oval:def:105882 Wireshark is a network traffic analyzer for Unix-ish operating systems. This package lays base for libpcap, a packet capture and filtering library, contains command-line utilities, contains plugins and documentation for wireshark. A graphical user interface is packaged separately to GTK+ package. oval:org.secpod.oval:def:14850 The host is installed with Wireshark 1.8.x before 1.8.9 or 1.10.x before 1.10.1 and is prone to multiple array index error vulnerabilities. The flaws are present in the application, which fails to handle a crafted packet. Successful exploitation allows attackers to cause an application crash. oval:org.secpod.oval:def:13761 The host is installed with Wireshark 1.8.x before 1.8.7 and is prone to denial of service vulnerability. A flaw is present in the application, which uses incorrect integer data types. Successful exploitation allows attackers to cause heap memory corruption or NULL pointer dereference or application ... oval:org.secpod.oval:def:13760 The host is installed with Wireshark 1.8.x before 1.8.7 and is prone to denial of service vulnerability. A flaw is present in the application, which uses an incorrect format string. Successful exploitation allows attackers to cause an application crash. oval:org.secpod.oval:def:13763 The host is installed with Wireshark 1.6.x before 1.6.15 or 1.8.x before 1.8.7 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly initialize a certain variable. Successful exploitation allows attackers to cause an application crash. oval:org.secpod.oval:def:13762 The host is installed with Wireshark 1.8.x before 1.8.7 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to terminate a bit-field list. Successful exploitation allows attackers to cause an application crash. oval:org.secpod.oval:def:14851 The host is installed with Wireshark 1.8.x before 1.8.9 or 1.10.x before 1.10.1 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle a crafted packet. Successful exploitation allows attackers to cause an application crash. oval:org.secpod.oval:def:13765 The host is installed with Wireshark 1.8.x before 1.8.7 and is prone to multiple integer signedness error vulnerabilities. The flaws are present in the application, which fails to handle a malformed packet. Successful exploitation allows attackers to cause a denial of service. oval:org.secpod.oval:def:106526 Wireshark is a network traffic analyzer for Unix-ish operating systems. This package lays base for libpcap, a packet capture and filtering library, contains command-line utilities, contains plugins and documentation for wireshark. A graphical user interface is packaged separately to GTK+ package. oval:org.secpod.oval:def:13764 The host is installed with Wireshark 1.8.x before 1.8.7 and is prone to denial of service vulnerability. A flaw is present in the application, which calls incorrect functions in certain contexts related to ciphers. Successful exploitation allows attackers to cause an application crash. oval:org.secpod.oval:def:14847 The host is installed with Wireshark 1.8.x before 1.8.9 or 1.10.x before 1.10.1 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to initialize a length field in certain abnormal situations. Successful exploitation allows attackers to cause an applica ... oval:org.secpod.oval:def:13758 The host is installed with Wireshark 1.8.x before 1.8.7 and is prone to multiple integer signedness error vulnerabilities. The flaws are present in the application, which fails to handle a malformed packet. Successful exploitation allows attackers to cause a denial of service. oval:org.secpod.oval:def:13759 The host is installed with Wireshark 1.8.x before 1.8.7 and is prone to multiple integer overflow vulnerabilities. The flaws are present in the application, which fails to properly handle a malformed packet. Successful exploitation allows attackers to cause a denial of service. oval:org.secpod.oval:def:14848 The host is installed with Wireshark 1.8.x before 1.8.9 or 1.10.x before 1.10.1 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to initialize certain structure members. Successful exploitation allows attackers to cause an application crash. oval:org.secpod.oval:def:14849 The host is installed with Wireshark 1.8.x before 1.8.9 or 1.10.x before 1.10.1 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly allocate memory. Successful exploitation allows attackers to cause an application crash. oval:org.secpod.oval:def:13770 The host is installed with Wireshark 1.6.x before 1.6.15 or 1.8.x before 1.8.7 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly initialize a certain variable. Successful exploitation allows attackers to cause an application crash. oval:org.secpod.oval:def:13771 The host is installed with Wireshark 1.8.x before 1.8.7 and is prone to denial of service vulnerability. A flaw is present in the application, which calls incorrect functions in certain contexts related to ciphers. Successful exploitation allows attackers to cause an application crash. oval:org.secpod.oval:def:1600294 Two flaws were found in Wireshark. If Wireshark read a malformed packet off a network or opened a malicious dump file, it could crash or, possibly, execute arbitrary code as the user running Wireshark. Several denial of service flaws were found in Wireshark. Wireshark could crash or stop responding ... oval:org.secpod.oval:def:8159 The host is installed with Wireshark 1.8.x before 1.8.4 and is prone to integer overflow vulnerability. A flaw is present in the application, which fails to handle the dissect_sack_chunk function in epan/dissectors/packet-sctp.c in the SCTP dissector. Successful exploitation allows remote attackers ... oval:org.secpod.oval:def:8153 The host is installed with Wireshark 1.6.x before 1.6.12 or 1.8.x before 1.8.4 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle the dissect_rtcp_app function in epan/dissectors/packet-rtcp.c in the RTCP dissector. Successful exploitation al ... oval:org.secpod.oval:def:13767 The host is installed with Wireshark 1.8.x before 1.8.7 and is prone to denial of service vulnerability. A flaw is present in the application, which uses an incorrect format string. Successful exploitation allows attackers to cause an application crash. oval:org.secpod.oval:def:8154 The host is installed with Wireshark 1.6.x before 1.6.12 or 1.8.x before 1.8.4 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle the dissect_wtp_common function in epan/dissectors/packet-wtp.c in the WTP dissector. Successful exploitation al ... oval:org.secpod.oval:def:13766 The host is installed with Wireshark 1.8.x before 1.8.7 and is prone to multiple integer overflow vulnerabilities. The flaws are present in the application, which fails to properly handle a malformed packet. Successful exploitation allows attackers to cause a denial of service. oval:org.secpod.oval:def:8155 The host is installed with Wireshark 1.6.x before 1.6.12 or 1.8.x before 1.8.4 and is prone to integer overflow vulnerability. A flaw is present in the application, which fails to handle the dissect_iscsi_pdu function in epan/dissectors/packet-iscsi.c in the iSCSI dissector. Successful exploitation ... oval:org.secpod.oval:def:13769 The host is installed with Wireshark 1.8.x before 1.8.7 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to terminate a bit-field list. Successful exploitation allows attackers to cause an application crash. oval:org.secpod.oval:def:13768 The host is installed with Wireshark 1.8.x before 1.8.7 and is prone to denial of service vulnerability. A flaw is present in the application, which uses incorrect integer data types. Successful exploitation allows attackers to cause heap memory corruption or NULL pointer dereference or application ... oval:org.secpod.oval:def:601047 Multiple vulnerabilities were discovered in the dissectors for GTPv2, ASN.1 BER, PPP CCP, DCP ETSI, MPEG DSM-CC and Websocket, which could result in denial of service or the execution of arbitrary code. The oldstable distribution is not affected. oval:org.secpod.oval:def:105970 Wireshark is a network traffic analyzer for Unix-ish operating systems. This package lays base for libpcap, a packet capture and filtering library, contains command-line utilities, contains plugins and documentation for wireshark. A graphical user interface is packaged separately to GTK+ package. oval:org.secpod.oval:def:105875 Wireshark is a network traffic analyzer for Unix-ish operating systems. This package lays base for libpcap, a packet capture and filtering library, contains command-line utilities, contains plugins and documentation for wireshark. A graphical user interface is packaged separately to GTK+ package. oval:org.secpod.oval:def:1500433 Updated wireshark packages that fix multiple security issues are now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having Moderate security impact. Common Vulnerability Scoring System base scores, which give detailed severity ratings, are avai ... oval:org.secpod.oval:def:1500432 Updated wireshark packages that fix multiple security issues are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having Moderate security impact. Common Vulnerability Scoring System base scores, which give detailed severity ratings, are avai ... oval:org.secpod.oval:def:601055 Multiple vulnerabilities were discovered in the dissectors for CAPWAP, GMR-1 BCCH, PPP, NBAP, RDP, HTTP, DCP ETSI and in the Ixia IxVeriWave file parser, which could result in denial of service or the execution of arbitrary code. oval:org.secpod.oval:def:14117 The host is installed with Wireshark 1.6.x before 1.6.16 or 1.8.x before 1.8.8 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly determine when to use a recursive approach. Successful exploitation allows attackers to cause denial of servic ... oval:org.secpod.oval:def:14115 The host is installed with Wireshark 1.6.x before 1.6.16, 1.8.x before 1.8.8 or 1.10.0 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to validate a certain fragment length value. Successful exploitation allows attackers to cause an application cras ... oval:org.secpod.oval:def:17063 The host is installed with Wireshark 1.10.0 before 1.10.6 or 1.8.0 before 1.8.13 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a malformed packet trace file. Successful exploitation could allow attackers to make Wireshark cras ... oval:org.secpod.oval:def:17060 The host is installed with Wireshark 1.10.0 before 1.10.6 or 1.8.0 before 1.8.13 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle a malformed packet trace file. Successful exploitation could allow attackers to execute malicious cod ... oval:org.secpod.oval:def:601082 Multiple vulnerabilities were discovered in the dissectors for DVB-CI, GSM A Common and ASN.1 PER and in the Netmon file parser. oval:org.secpod.oval:def:14127 The host is installed with Wireshark 1.6.x before 1.6.16 or 1.8.x before 1.8.8 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly determine when to use a recursive approach. Successful exploitation allows attackers to cause denial of servic ... oval:org.secpod.oval:def:14125 The host is installed with Wireshark 1.6.x before 1.6.16, 1.8.x before 1.8.8 or 1.10.0 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to validate a certain fragment length value. Successful exploitation allows attackers to cause an application cras ... oval:org.secpod.oval:def:203233 Wireshark is a network protocol analyzer. It is used to capture and browse the traffic running on a computer network. Multiple flaws were found in Wireshark. If Wireshark read a malformed packet off a network or opened a malicious dump file, it could crash or, possibly, execute arbitrary code as the ... oval:org.secpod.oval:def:203231 Wireshark is a network protocol analyzer. It is used to capture and browse the traffic running on a computer network. Two flaws were found in Wireshark. If Wireshark read a malformed packet off a network or opened a malicious dump file, it could crash or, possibly, execute arbitrary code as the user ... oval:org.secpod.oval:def:1500299 Updated wireshark packages that fix multiple security issues, several bugs, and add various enhancements are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System base scores, wh ... oval:org.secpod.oval:def:1300292 Multiple vulnerabilities was found and corrected in Wireshark: * The NFS dissector could crash. Discovered by Moshe Kaplan . * The RLC dissector could crash . * The MPEG file parser could overflow a buffer. Discovered by Wesley Neelen . This advisory provides the latest version of Wireshark which i ... oval:org.secpod.oval:def:17052 The host is installed with Wireshark 1.10.0 before 1.10.6 or 1.8.0 before 1.8.13 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle a malformed packet trace file. Successful exploitation could allow attackers to execute malicious cod ... oval:org.secpod.oval:def:17055 The host is installed with Wireshark 1.10.0 before 1.10.6 or 1.8.0 before 1.8.13 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a malformed packet trace file. Successful exploitation could allow attackers to make Wireshark cras ... oval:org.secpod.oval:def:40856 The host is installed Wireshark 1.8.x before 1.8.9 or 1.10.x before 1.10.1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly determine whether there is remaining packet data to process. Successful exploitation allows remote attackers to ... oval:org.secpod.oval:def:501217 Wireshark is a network protocol analyzer. It is used to capture and browse the traffic running on a computer network. Two flaws were found in Wireshark. If Wireshark read a malformed packet off a network or opened a malicious dump file, it could crash or, possibly, execute arbitrary code as the user ... oval:org.secpod.oval:def:501218 Wireshark is a network protocol analyzer. It is used to capture and browse the traffic running on a computer network. Multiple flaws were found in Wireshark. If Wireshark read a malformed packet off a network or opened a malicious dump file, it could crash or, possibly, execute arbitrary code as the ... oval:org.secpod.oval:def:16433 The host is installed with Wireshark 1.8.x before 1.8.12 or 1.10.x before 1.10.4 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to check for empty lines. Successful exploitation allows attackers to cause infinite loop via a crafted packet. oval:org.secpod.oval:def:40861 The host is installed Wireshark 1.8.x before 1.8.9 or 1.10.x before 1.10.1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly determine whether there is remaining packet data to process. Successful exploitation allows remote attackers to ... oval:org.secpod.oval:def:601226 Multiple vulnerabilities were discovered in Wireshark: CVE-2014-2281 Moshe Kaplan discovered that the NFS dissector could be crashed, resulting in denial of service. CVE-2014-2283 It was discovered that the RLC dissector could be crashed, resulting in denial of service. CVE-2014-2299 Wesley Neelen d ... oval:org.secpod.oval:def:40862 The host is installed Wireshark 1.8.x before 1.8.9 or 1.10.x before 1.10.1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a crafted packet-trace file. Successful exploitation allows remote attackers to cause a denial of service ... oval:org.secpod.oval:def:40860 The host is installed Wireshark 1.8.x before 1.8.9 or 1.10.x before 1.10.1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly determine whether there is remaining packet data to process. Successful exploitation allows remote attackers to ... oval:org.secpod.oval:def:40863 The host is installed Wireshark 1.8.x before 1.8.9 or 1.10.x before 1.10.1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a crafted packet-trace file. Successful exploitation allows remote attackers to cause a denial of service ... oval:org.secpod.oval:def:16436 The host is installed with Wireshark 1.8.x before 1.8.12 or 1.10.x before 1.10.4 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to check for empty lines. Successful exploitation allows attackers to cause infinite loop via a crafted packet. oval:org.secpod.oval:def:40864 The host is installed Wireshark 1.8.x before 1.8.9 or 1.10.x before 1.10.1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly initialize a length field in certain abnormal situations. Successful exploitation allows remote attackers to cau ... oval:org.secpod.oval:def:15596 The host is installed with Wireshark 1.8.x before 1.8.10 or 1.10.x before 1.10.2 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly determine when to enter a certain loop. Successful exploitation allows attackers to cause application crash. oval:org.secpod.oval:def:1600131 Two flaws were found in Wireshark. If Wireshark read a malformed packet off a network or opened a malicious dump file, it could crash or, possibly, execute arbitrary code as the user running Wireshark. Several denial of service flaws were found in Wireshark. Wireshark could crash or stop responding ... oval:org.secpod.oval:def:15590 The host is installed with Wireshark Wireshark 1.8.x before 1.8.10 or 1.10.x before 1.10.2 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly determine when to enter a certain loop. Successful exploitation allows attackers to cause applicat ... |