[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249966

 
 

909

 
 

195636

 
 

282

Paid content will be excluded from the download.


Download | Alert*


oval:org.secpod.oval:def:42402
The host is installed with Wireshark 2.0.x before 2.0.16, 2.2.x before 2.2.10 or 2.4.x before 2.4.2 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a malformed packet trace file. Successful exploitation could allow remote attack ...

oval:org.secpod.oval:def:42405
The host is installed with Wireshark 2.0.x before 2.0.16, 2.2.x before 2.2.10 or 2.4.x before 2.4.2 and is prone to a memory corruption vulnerability. A flaw is present in the application, which fails to properly handle a malformed packet trace file. Successful exploitation could allow remote attack ...

oval:org.secpod.oval:def:34218
The host is installed with Wireshark 1.12.x before 1.12.10 or 2.0.x before 2.0.2 and is prone to a denial of service vulnerability. A flaw is present in the GSM A-bis OML dissector, which fails to handle a crafted packet that triggers a 0xff tag value. Successful exploitation could allow remote atta ...

oval:org.secpod.oval:def:34211
The host is installed with Wireshark 1.12.x before 1.12.10 or 2.0.x before 2.0.2 and is prone to a denial of service vulnerability. A flaw is present in the GSM A-bis OML dissector, which fails to handle a crafted packet that triggers a 0xff tag value. Successful exploitation could allow remote atta ...

oval:org.secpod.oval:def:34219
The host is installed with Wireshark 2.0.x before 2.0.2 and is prone to a denial of service vulnerability. A flaw is present in the Ixia IxVeriWave file parser, which incorrectly increases a certain octet count. Successful exploitation could allow remote attackers to cause a denial of service (heap- ...

oval:org.secpod.oval:def:34212
The host is installed with Wireshark 2.0.x before 2.0.2 and is prone to a denial of service vulnerability. A flaw is present in the Ixia IxVeriWave file parser, which incorrectly increases a certain octet count. Successful exploitation could allow remote attackers to cause a denial of service (heap- ...

oval:org.secpod.oval:def:34220
The host is installed with Wireshark 2.0.x before 2.0.2 and is prone to a denial of service vulnerability. A flaw is present in the IEEE 802.11 dissector, which fails to properly handle the grouping subfield. Successful exploitation could allow remote attackers to cause a denial of service (buffer o ...

oval:org.secpod.oval:def:34213
The host is installed with Wireshark 2.0.x before 2.0.2 and is prone to a denial of service vulnerability. A flaw is present in the IEEE 802.11 dissector, which fails to properly handle the grouping subfield. Successful exploitation could allow remote attackers to cause a denial of service (buffer o ...

oval:org.secpod.oval:def:34221
The host is installed with Wireshark 1.12.x before 1.12.10 or 2.0.x before 2.0.2 and is prone to a denial of service vulnerability. A flaw is present in the ASN.1 BER dissector, which fails to handle a crafted packet that triggers an empty set. Successful exploitation could allow remote attackers to ...

oval:org.secpod.oval:def:34214
The host is installed with Wireshark 1.12.x before 1.12.10 or 2.0.x before 2.0.2 and is prone to a denial of service vulnerability. A flaw is present in the ASN.1 BER dissector, which fails to handle a crafted packet that triggers an empty set. Successful exploitation could allow remote attackers to ...

oval:org.secpod.oval:def:34222
The host is installed with Wireshark 2.0.x before 2.0.2 and is prone to a denial of service vulnerability. A flaw is present in the SPICE dissector, which mishandles capability data. Successful exploitation could allow remote attackers to cause a denial of service (large loop).

oval:org.secpod.oval:def:34215
The host is installed with Wireshark 2.0.x before 2.0.2 and is prone to a denial of service vulnerability. A flaw is present in the SPICE dissector, which mishandles capability data. Successful exploitation could allow remote attackers to cause a denial of service (large loop).

oval:org.secpod.oval:def:34223
The host is installed with Wireshark 2.0.x before 2.0.2 and is prone to a denial of service vulnerability. A flaw is present in the NFS dissector, which fails to properly handle a crafted packet. Successful exploitation could allow remote attackers to cause a denial of service (application crash).

oval:org.secpod.oval:def:34216
The host is installed with Wireshark 2.0.x before 2.0.2 and is prone to a denial of service vulnerability. A flaw is present in the NFS dissector, which fails to properly handle a crafted packet. Successful exploitation could allow remote attackers to cause a denial of service (application crash).

oval:org.secpod.oval:def:34224
The host is installed with Wireshark 1.12.x before 1.12.10 or 2.0.x before 2.0.2 and is prone to a denial of service vulnerability. A flaw is present in the ASN.1 BER dissector, which fails to properly handle a packet that specifies deeply nested data. Successful exploitation could allow remote atta ...

oval:org.secpod.oval:def:34217
The host is installed with Wireshark 1.12.x before 1.12.10 or 2.0.x before 2.0.2 and is prone to a denial of service vulnerability. A flaw is present in the ASN.1 BER dissector, which fails to properly handle a packet that specifies deeply nested data. Successful exploitation could allow remote atta ...

oval:org.secpod.oval:def:36098
The host is installed with Wireshark 1.12.x before 1.12.12 or 2.0.x before 2.0.4 and is prone to a denial of service vulnerability. A flaw is present in the Toshiba file parser, which fails to handle a malformed packet. Successful exploitation allows remote attackers to cause Wireshark to crash.

oval:org.secpod.oval:def:36097
The host is installed with Wireshark 1.12.x before 1.12.12 or 2.0.x before 2.0.4 and is prone to a denial of service vulnerability. A flaw is present in the USB dissectors, which fails to handle injection of a malformed packet onto the wire. Successful exploitation allows remote attackers to cause W ...

oval:org.secpod.oval:def:36096
The host is installed with Wireshark 1.12.x before 1.12.12 or 2.0.x before 2.0.4 and is prone to a denial of service vulnerability. A flaw is present in the UMTS FP dissector, which fails to handle injection of a malformed packet onto the wire. Successful exploitation allows remote attackers to caus ...

oval:org.secpod.oval:def:36095
The host is installed with Wireshark 2.0.x before 2.0.4 and is prone to a denial of service vulnerability. A flaw is present in the IEEE 802.11 dissector, which fails to handle injection of a malformed packet onto the wire. Successful exploitation allows remote attackers to cause Wireshark to crash.

oval:org.secpod.oval:def:36094
The host is installed with Wireshark 1.12.x before 1.12.12 or 2.0.x before 2.0.4 and is prone to a denial of service vulnerability. A flaw is present in the IEEE 802.11 dissector, which fails to handle injection of a malformed packet onto the wire. Successful exploitation allows remote attackers to ...

oval:org.secpod.oval:def:36093
The host is installed with Wireshark 1.12.x before 1.12.12 or 2.0.x before 2.0.4 and is prone to a denial of service vulnerability. A flaw is present in the SPOOLS dissector, which fails to handle injection of a malformed packet onto the wire. Successful exploitation allows remote attackers to cause ...

oval:org.secpod.oval:def:36091
The host is installed with Wireshark 2.0.x before 2.0.4 and is prone to a denial of service vulnerability. A flaw is present in the Ethernet dissector, which fails to handle a malformed packet. Successful exploitation allows remote attackers to cause Wireshark to crash.

oval:org.secpod.oval:def:36099
The host is installed with Wireshark 1.12.x before 1.12.12 or 2.0.x before 2.0.4 and is prone to a denial of service vulnerability. A flaw is present in the CoSine file parser, which fails to handle a malformed packet. Successful exploitation allows remote attackers to cause Wireshark to crash.

oval:org.secpod.oval:def:36090
The host is installed with Wireshark 1.12.x before 1.12.12 or 2.0.x before 2.0.4 and is prone to a denial of service vulnerability. A flaw is present in the NetScreen file parser, which fails to handle a malformed packet. Successful exploitation allows remote attackers to cause Wireshark to crash.

oval:org.secpod.oval:def:36087
The host is installed with Wireshark 1.12.x before 1.12.12 or 2.0.x before 2.0.4 and is prone to a denial of service vulnerability. A flaw is present in the USB dissectors, which fails to handle injection of a malformed packet onto the wire. Successful exploitation allows remote attackers to cause W ...

oval:org.secpod.oval:def:36086
The host is installed with Wireshark 1.12.x before 1.12.12 or 2.0.x before 2.0.4 and is prone to a denial of service vulnerability. A flaw is present in the UMTS FP dissector, which fails to handle injection of a malformed packet onto the wire. Successful exploitation allows remote attackers to caus ...

oval:org.secpod.oval:def:36085
The host is installed with Wireshark 2.0.x before 2.0.4 and is prone to a denial of service vulnerability. A flaw is present in the IEEE 802.11 dissector, which fails to handle injection of a malformed packet onto the wire. Successful exploitation allows remote attackers to cause Wireshark to crash.

oval:org.secpod.oval:def:36084
The host is installed with Wireshark 1.12.x before 1.12.12 or 2.0.x before 2.0.4 and is prone to a denial of service vulnerability. A flaw is present in the IEEE 802.11 dissector, which fails to handle injection of a malformed packet onto the wire. Successful exploitation allows remote attackers to ...

oval:org.secpod.oval:def:36083
The host is installed with Wireshark 1.12.x before 1.12.12 or 2.0.x before 2.0.4 and is prone to a denial of service vulnerability. A flaw is present in the SPOOLS dissector, which fails to handle injection of a malformed packet onto the wire. Successful exploitation allows remote attackers to cause ...

oval:org.secpod.oval:def:36089
The host is installed with Wireshark 1.12.x before 1.12.12 or 2.0.x before 2.0.4 and is prone to a denial of service vulnerability. A flaw is present in the CoSine file parser, which fails to handle a malformed packet. Successful exploitation allows remote attackers to cause Wireshark to crash.

oval:org.secpod.oval:def:36088
The host is installed with Wireshark 1.12.x before 1.12.12 or 2.0.x before 2.0.4 and is prone to a denial of service vulnerability. A flaw is present in the Toshiba file parser, which fails to handle a malformed packet. Successful exploitation allows remote attackers to cause Wireshark to crash.

oval:org.secpod.oval:def:36101
The host is installed with Wireshark 2.0.x before 2.0.4 and is prone to a denial of service vulnerability. A flaw is present in the Ethernet dissector, which fails to handle a malformed packet. Successful exploitation allows remote attackers to cause Wireshark to crash.

oval:org.secpod.oval:def:36100
The host is installed with Wireshark 1.12.x before 1.12.12 or 2.0.x before 2.0.4 and is prone to a denial of service vulnerability. A flaw is present in the NetScreen file parser, which fails to handle a malformed packet. Successful exploitation allows remote attackers to cause Wireshark to crash.

oval:org.secpod.oval:def:1800473
CVE-2016-5350: SPOOLS infinite loop. Affected versions: 2.0.0 to 2.0.3, 1.12.0 to 1.12.11 Fixed versions: 2.0.4, 1.12.12

oval:org.secpod.oval:def:1800595
CVE-2016-5350: SPOOLS infinite loop Affected versions: 2.0.0 to 2.0.3, 1.12.0 to 1.12.11 Fixed versions: 2.0.4, 1.12.12

oval:org.secpod.oval:def:38845
The host is installed with Wireshark 2.0.x before 2.0.10 or 2.2.x before 2.2.4 and is prone to a denial of service vulnerability. A flaw is present in the DHCPv6 dissector, which fails to properly handle a malformed capture file. Successful exploitation could allow remote attackers to force the appl ...

oval:org.secpod.oval:def:33149
The host is installed with Wireshark 1.12.x before 1.12.10 or 2.0.x before 2.0.2 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to limit the recursion depth. Successful exploitation could allow remote attackers to cause a denial of service (memor ...

oval:org.secpod.oval:def:33148
The host is installed with Wireshark 1.12.x before 1.12.10 or 2.0.x before 2.0.2 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted packet that triggers a 0xff tag value. Successful exploitation could allow remote attackers to cau ...

oval:org.secpod.oval:def:33145
The host is installed with Wireshark 2.0.x before 2.0.2 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to validate length values. Successful exploitation could allow remote attackers to cause a denial of service (stack-based buffer overflow and a ...

oval:org.secpod.oval:def:33144
The host is installed with Wireshark 2.0.x before 2.0.2 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to ensure that a '\0' character is present at the end of certain strings. Successful exploitation could allow remote attackers to cause a denia ...

oval:org.secpod.oval:def:33147
The host is installed with Wireshark 1.12.x before 1.12.10 or 2.0.x before 2.0.2 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle the case of an unrecognized TLV type. Successful exploitation could allow remote attackers to cause a denial ...

oval:org.secpod.oval:def:33146
The host is installed with Wireshark 2.0.x before 2.0.2 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to consider that a line may lack the "OBJECT PROTOCOL" substring. Successful exploitation could allow remote attackers to cause a denial of ser ...

oval:org.secpod.oval:def:33141
The host is installed with Wireshark 2.0.x before 2.0.2 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle crafted packet. Successful exploitation could allow remote attackers to cause a denial of service (application crash).

oval:org.secpod.oval:def:33140
The host is installed with Wireshark 1.12.x before 1.12.10 or 2.0.x before 2.0.2 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle crafted packet. Successful exploitation could allow remote attackers to cause a denial of service (infinite ...

oval:org.secpod.oval:def:33143
The host is installed with Wireshark 2.0.x before 2.0.2 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to validate the data type. Successful exploitation could allow remote attackers to cause a denial of service (out-of-bounds read and applicatio ...

oval:org.secpod.oval:def:33142
The host is installed with Wireshark 2.0.x before 2.0.2 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to limit the amount of header data. Successful exploitation could allow remote attackers to cause a denial of service (memory consumption or ap ...

oval:org.secpod.oval:def:33138
The host is installed with Wireshark 1.12.x before 1.12.10 or 2.0.x before 2.0.2 and is prone to an untrusted search path vulnerability. A flaw is present in the Wireshark Application class, which fails to handle a Trojan horse riched20.dll.dll file in the current working directory, related to use o ...

oval:org.secpod.oval:def:33137
The host is installed with Wireshark 1.12.x before 1.12.10 or 2.0.x before 2.0.2 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to limit the recursion depth. Successful exploitation could allow remote attackers to cause a denial of service (memor ...

oval:org.secpod.oval:def:33139
The host is installed with Wireshark 2.0.x before 2.0.2 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle BER dissector which verifies certain length is nonzero. Successful exploitation could allow remote attackers to cause a denial of ser ...

oval:org.secpod.oval:def:33134
The host is installed with Wireshark 2.0.x before 2.0.2 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to consider that a line may lack the "OBJECT PROTOCOL" substring. Successful exploitation could allow remote attackers to cause a denial of ser ...

oval:org.secpod.oval:def:40704
The host is installed with Wireshark 2.0.x before 2.0.13 or 2.2.x before 2.2.7 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a malformed packet trace file. Successful exploitation could allow remote attackers to crash the serv ...

oval:org.secpod.oval:def:33133
The host is installed with Wireshark 2.0.x before 2.0.2 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to validate length values. Successful exploitation could allow remote attackers to cause a denial of service (stack-based buffer overflow and a ...

oval:org.secpod.oval:def:40705
The host is installed with Wireshark 2.0.x before 2.0.13 or 2.2.x before 2.2.7 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle the Vendor Class Identifier. Successful exploitation could allow remote attackers to read past the end ...

oval:org.secpod.oval:def:33136
The host is installed with Wireshark 1.12.x before 1.12.10 or 2.0.x before 2.0.2 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted packet that triggers a 0xff tag value. Successful exploitation could allow remote attackers to cau ...

oval:org.secpod.oval:def:40702
The host is installed with Wireshark 2.0.x before 2.0.13 or 2.2.x before 2.2.7 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a crafted IPv4 address. Successful exploitation could allow remote attackers to crash the service.

oval:org.secpod.oval:def:33135
The host is installed with Wireshark 1.12.x before 1.12.10 or 2.0.x before 2.0.2 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle the case of an unrecognized TLV type. Successful exploitation could allow remote attackers to cause a denial ...

oval:org.secpod.oval:def:33130
The host is installed with Wireshark 2.0.x before 2.0.2 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to limit the amount of header data. Successful exploitation could allow remote attackers to cause a denial of service (memory consumption or ap ...

oval:org.secpod.oval:def:33132
The host is installed with Wireshark 2.0.x before 2.0.2 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to ensure that a '\0' character is present at the end of certain strings. Successful exploitation could allow remote attackers to cause a denia ...

oval:org.secpod.oval:def:40706
The host is installed with Wireshark 2.0.x before 2.0.13 or 2.2.x before 2.2.7 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly check for a negative length. Successful exploitation could allow remote attackers to crash the service.

oval:org.secpod.oval:def:33131
The host is installed with Wireshark 2.0.x before 2.0.2 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to validate the data type. Successful exploitation could allow remote attackers to cause a denial of service (out-of-bounds read and applicatio ...

oval:org.secpod.oval:def:40707
The host is installed with Wireshark 2.0.x before 2.0.13 or 2.2.x before 2.2.7 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a malformed packet trace file. Successful exploitation could allow remote attackers to crash the serv ...

oval:org.secpod.oval:def:33127
The host is installed with Wireshark 2.0.x before 2.0.2 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle BER dissector which verifies certain length is nonzero. Successful exploitation could allow remote attackers to cause a denial of ser ...

oval:org.secpod.oval:def:33126
The host is installed with Wireshark 1.12.x before 1.12.10 or 2.0.x before 2.0.2 and is prone to an untrusted search path vulnerability. A flaw is present in the WiresharkApplication class, which fails to handle a Trojan horse riched20.dll.dll file in the current working directory, related to use of ...

oval:org.secpod.oval:def:33129
The host is installed with Wireshark 2.0.x before 2.0.2 and is prone to a denial of service vulnerability. A flaw is present in the application, which mishandles the algorithm ID. Successful exploitation could allow remote attackers to cause a denial of service (application crash) via a crafted pack ...

oval:org.secpod.oval:def:33128
The host is installed with Wireshark 1.12.x before 1.12.10 or 2.0.x before 2.0.2 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted packet. Successful exploitation could allow remote attackers to cause a denial of service (infinit ...

oval:org.secpod.oval:def:40711
The host is installed with Wireshark 2.0.x before 2.0.13 or 2.2.x before 2.2.7 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly detect self-referencing pointers. Successful exploitation could allow remote attackers to crash the service.

oval:org.secpod.oval:def:40712
The host is installed with Wireshark 2.0.x before 2.0.13 or 2.2.x before 2.2.7 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly validate an interval value. Successful exploitation could allow remote attackers to crash the service.

oval:org.secpod.oval:def:40710
The host is installed with Wireshark 2.0.x before 2.0.13 or 2.2.x before 2.2.7 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a malformed packet trace file. Successful exploitation could allow remote attackers to crash the serv ...

oval:org.secpod.oval:def:40713
The host is installed with Wireshark 2.0.x before 2.0.13 or 2.2.x before 2.2.7 and is prone to a null pointer dereference vulnerability. A flaw is present in the application, which fails to properly handle a NULL pointer. Successful exploitation could allow remote attackers to crash the service.

oval:org.secpod.oval:def:40683
The host is installed with Wireshark 2.0.x before 2.0.13 or 2.2.x before 2.2.7 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly validate an interval value. Successful exploitation could allow remote attackers to crash the service.

oval:org.secpod.oval:def:40684
The host is installed with Wireshark 2.0.x before 2.0.13 or 2.2.x before 2.2.7 and is prone to a null pointer dereference vulnerability. A flaw is present in the application, which fails to properly handle a NULL pointer. Successful exploitation could allow remote attackers to crash the service.

oval:org.secpod.oval:def:38872
The host is installed with Wireshark 2.0.x before 2.0.10 or 2.2.x before 2.2.4 and is prone to a denial of service vulnerability. A flaw is present in the DHCPv6 dissector, which fails to properly handle a malformed capture file. Successful exploitation could allow remote attackers to force the appl ...

oval:org.secpod.oval:def:38873
The host is installed with Wireshark 2.0.x before 2.0.10 or 2.2.x before 2.2.4 and is prone to a denial of service vulnerability. A flaw is present in the ASTERIX dissector, which fails to properly handle a malformed capture file. Successful exploitation could allow remote attackers to force the app ...

oval:org.secpod.oval:def:39940
The host is installed with Wireshark 2.0.x before 2.0.12 or 2.2.x before 2.2.6 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a packet injection or a malformed capture file. Successful exploitation could allow remote attackers ...

oval:org.secpod.oval:def:38846
The host is installed with Wireshark 2.0.x before 2.0.10 or 2.2.x before 2.2.4 and is prone to a denial of service vulnerability. A flaw is present in the ASTERIX dissector, which fails to properly handle a malformed capture file. Successful exploitation could allow remote attackers to force the app ...

oval:org.secpod.oval:def:39937
The host is installed with Wireshark 2.0.x before 2.0.12 or 2.2.x before 2.2.6 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a packet injection or a malformed capture file. Successful exploitation could allow remote attackers ...

oval:org.secpod.oval:def:39938
The host is installed with Wireshark 2.0.x before 2.0.12 or 2.2.x before 2.2.6 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a packet injection or a malformed capture file. Successful exploitation could allow remote attackers ...

oval:org.secpod.oval:def:39939
The host is installed with Wireshark 2.0.x before 2.0.12 or 2.2.x before 2.2.6 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a packet injection or a malformed capture file. Successful exploitation could allow remote attackers ...

oval:org.secpod.oval:def:39870
The host is installed with Wireshark 2.0.x before 2.0.12 or 2.2.x before 2.2.6 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a packet injection or a malformed capture file. Successful exploitation could allow remote attackers ...

oval:org.secpod.oval:def:39871
The host is installed with Wireshark 2.0.x before 2.0.12 or 2.2.x before 2.2.6 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a packet injection or a malformed capture file. Successful exploitation could allow remote attackers ...

oval:org.secpod.oval:def:39869
The host is installed with Wireshark 2.0.x before 2.0.12 or 2.2.x before 2.2.6 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a packet injection or a malformed capture file. Successful exploitation could allow remote attackers ...

oval:org.secpod.oval:def:39861
The host is installed with Wireshark 2.0.x before 2.0.12 or 2.2.x before 2.2.6 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a packet injection or a malformed capture file. Successful exploitation could allow remote attackers ...

oval:org.secpod.oval:def:41400
The host is installed with Wireshark 2.0.x through 2.0.13 or 2.2.x through 2.2.7 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a malformed packet trace file. Successful exploitation could allow remote attackers to crash the se ...

oval:org.secpod.oval:def:39862
The host is installed with Wireshark 2.0.x before 2.0.12 or 2.2.x before 2.2.6 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a packet injection or a malformed capture file. Successful exploitation could allow remote attackers ...

oval:org.secpod.oval:def:40675
The host is installed with Wireshark 2.0.x before 2.0.13 or 2.2.x before 2.2.7 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a malformed packet trace file. Successful exploitation could allow remote attackers to crash the serv ...

oval:org.secpod.oval:def:41401
The host is installed with Wireshark 2.0.x through 2.0.13 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a malformed packet trace file. Successful exploitation could allow remote attackers to crash the service.

oval:org.secpod.oval:def:39863
The host is installed with Wireshark 2.0.x before 2.0.12 or 2.2.x before 2.2.6 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a packet injection or a malformed capture file. Successful exploitation could allow remote attackers ...

oval:org.secpod.oval:def:39864
The host is installed with Wireshark 2.0.x before 2.0.12 or 2.2.x before 2.2.6 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a packet injection or a malformed capture file. Successful exploitation could allow remote attackers ...

oval:org.secpod.oval:def:40673
The host is installed with Wireshark 2.0.x before 2.0.13 or 2.2.x before 2.2.7 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a crafted IPv4 address. Successful exploitation could allow remote attackers to crash the service.

oval:org.secpod.oval:def:39865
The host is installed with Wireshark 2.0.x before 2.0.12 or 2.2.x before 2.2.6 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a packet injection or a malformed capture file. Successful exploitation could allow remote attackers ...

oval:org.secpod.oval:def:40678
The host is installed with Wireshark 2.0.x before 2.0.13 or 2.2.x before 2.2.7 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a malformed packet trace file. Successful exploitation could allow remote attackers to crash the serv ...

oval:org.secpod.oval:def:39867
The host is installed with Wireshark 2.0.x before 2.0.12 or 2.2.x before 2.2.6 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a packet injection or a malformed capture file. Successful exploitation could allow remote attackers ...

oval:org.secpod.oval:def:40676
The host is installed with Wireshark 2.0.x before 2.0.13 or 2.2.x before 2.2.7 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle the Vendor Class Identifier. Successful exploitation could allow remote attackers to read past the end ...

oval:org.secpod.oval:def:41402
The host is installed with Wireshark 2.0.x through 2.0.13 or 2.2.x through 2.2.7 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle length validation. Successful exploitation could allow remote attackers to crash the service.

oval:org.secpod.oval:def:39868
The host is installed with Wireshark 2.0.x before 2.0.12 or 2.2.x before 2.2.6 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a packet injection or a malformed capture file. Successful exploitation could allow remote attackers ...

oval:org.secpod.oval:def:40677
The host is installed with Wireshark 2.0.x before 2.0.13 or 2.2.x before 2.2.7 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly check for a negative length. Successful exploitation could allow remote attackers to crash the service.

oval:org.secpod.oval:def:41403
The host is installed with Wireshark 2.0.x through 2.0.13 or 2.2.x through 2.2.7 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle the relationships between indexes and lengths. Successful exploitation could allow remote attackers ...

oval:org.secpod.oval:def:40681
The host is installed with Wireshark 2.0.x before 2.0.13 or 2.2.x before 2.2.7 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a malformed packet trace file. Successful exploitation could allow remote attackers to crash the serv ...

oval:org.secpod.oval:def:40682
The host is installed with Wireshark 2.0.x before 2.0.13 or 2.2.x before 2.2.7 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly detect self-referencing pointers. Successful exploitation could allow remote attackers to crash the service.

oval:org.secpod.oval:def:41385
The host is installed with Wireshark 2.0.x through 2.0.13 or 2.2.x through 2.2.7 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a malformed packet trace file. Successful exploitation could allow remote attackers to crash the se ...

oval:org.secpod.oval:def:41386
The host is installed with Wireshark 2.0.x through 2.0.13 or 2.2.x through 2.2.7 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a malformed packet trace file. Successful exploitation could allow remote attackers to crash the se ...

oval:org.secpod.oval:def:41384
The host is installed with Wireshark 2.0.x through 2.0.13 or 2.2.x through 2.2.7 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a malformed packet trace file. Successful exploitation could allow remote attackers to crash the se ...

oval:org.secpod.oval:def:41389
The host is installed with Wireshark 2.0.x through 2.0.13 or 2.2.x through 2.2.7 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle the relationships between indexes and lengths. Successful exploitation could allow remote attackers ...

oval:org.secpod.oval:def:41387
The host is installed with Wireshark 2.0.x through 2.0.13 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a malformed packet trace file. Successful exploitation could allow remote attackers to crash the service.

oval:org.secpod.oval:def:41388
The host is installed with Wireshark 2.0.x through 2.0.13 or 2.2.x through 2.2.7 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle length validation. Successful exploitation could allow remote attackers to crash the service.

oval:org.secpod.oval:def:38110
The host is installed with Wireshark 2.0.x before 2.0.8 or 2.2.x before 2.2.2 and is prone to a denial of service vulnerability. A flaw is present in the AllJoyn dissector, which fails to properly handle network traffic or a capture file. Successful exploitation allow attackers to crash the service ...

oval:org.secpod.oval:def:38111
The host is installed with Wireshark 2.0.x before 2.0.8 or 2.2.x before 2.2.2 and is prone to an use-after-free vulnerability. A flaw is present in the DCERPC dissector, which fails to properly handle network traffic or a capture file. Successful exploitation allow attackers to crash the service wit ...

oval:org.secpod.oval:def:38109
The host is installed with Wireshark 2.0.x before 2.0.8 or 2.2.x before 2.2.2 and is prone to an unspecified vulnerability. A flaw is present in the OpenFlow dissector, which fails to properly handle network traffic or a capture file. Successful exploitation allow attackers to crash the service by f ...

oval:org.secpod.oval:def:38101
The host is installed with Wireshark 2.0.x before 2.0.7 or 2.2.x before 2.2.2 and is prone to a denial of service vulnerability. A flaw is present in the OpenFlow dissector, which fails to properly handle network traffic or a capture file. Successful exploitation allow attackers to crash the service ...

oval:org.secpod.oval:def:41830
The host is installed with Wireshark 2.0.x before 2.0.15 or 2.2.x before 2.2.9 or 2.4.0 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a malformed packet. Successful exploitation could allow remote attackers to crash the servic ...

oval:org.secpod.oval:def:38102
The host is installed with Wireshark 2.0.x before 2.0.8 or 2.2.x before 2.2.2 and is prone to an unspecified vulnerability. A flaw is present in the OpenFlow dissector, which fails to properly handle network traffic or a capture file. Successful exploitation allow attackers to crash the service by f ...

oval:org.secpod.oval:def:38103
The host is installed with Wireshark 2.0.x before 2.0.8 or 2.2.x before 2.2.2 and is prone to a denial of service vulnerability. A flaw is present in the AllJoyn dissector, which fails to properly handle network traffic or a capture file. Successful exploitation allow attackers to crash the service ...

oval:org.secpod.oval:def:41398
The host is installed with Wireshark 2.0.x through 2.0.13 or 2.2.x through 2.2.7 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a malformed packet trace file. Successful exploitation could allow remote attackers to crash the se ...

oval:org.secpod.oval:def:38104
The host is installed with Wireshark 2.0.x before 2.0.8 or 2.2.x before 2.2.2 and is prone to an use-after-free vulnerability. A flaw is present in the DCERPC dissector, which fails to properly handle network traffic or a capture file. Successful exploitation allow attackers to crash the service wit ...

oval:org.secpod.oval:def:41399
The host is installed with Wireshark 2.0.x through 2.0.13 or 2.2.x through 2.2.7 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a malformed packet trace file. Successful exploitation could allow remote attackers to crash the se ...

oval:org.secpod.oval:def:41833
The host is installed with Wireshark 2.2.x before 2.2.9 or 2.4.0 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a malformed packet. Successful exploitation could allow remote attackers to crash the service.

oval:org.secpod.oval:def:38108
The host is installed with Wireshark 2.0.x before 2.0.8 or 2.2.x before 2.2.2 and is prone to a denial of service vulnerability. A flaw is present in the OpenFlow dissector, which fails to properly handle network traffic or a capture file. Successful exploitation allow attackers to crash the service ...

oval:org.secpod.oval:def:41838
The host is installed with Wireshark 2.2.x before 2.2.9 or 2.4.0 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a malformed packet. Successful exploitation could allow remote attackers to crash the service.

oval:org.secpod.oval:def:41836
The host is installed with Wireshark 2.0.x before 2.0.15 or 2.2.x before 2.2.9 or 2.4.0 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a malformed packet. Successful exploitation could allow remote attackers to crash the servic ...

oval:org.secpod.oval:def:41835
The host is installed with Wireshark 2.0.x before 2.0.15 or 2.2.x before 2.2.9 or 2.4.0 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle a malformed packet. Successful exploitation could allow remote attackers to crash the service.

oval:org.secpod.oval:def:41840
The host is installed with Wireshark 2.0.x before 2.0.15 or 2.2.x before 2.2.9 or 2.4.0 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle a malformed packet. Successful exploitation could allow remote attackers to crash the service.

oval:org.secpod.oval:def:1800744
CVE-2017-15191: DMP dissector crash Affected versions: 2.4.0 to 2.4.1, 2.2.0 to 2.2.9, 2.0.0 to 2.0.15 Fixed versions: 2.4.2, 2.2.10, 2.0.16

oval:org.secpod.oval:def:1800786
CVE-2017-15191: DMP dissector crash; Affected versions: 2.4.0 to 2.4.1, 2.2.0 to 2.2.9, 2.0.0 to 2.0.15 Fixed versions: 2.4.2, 2.2.10, 2.0.16

oval:org.secpod.oval:def:1800897
CVE-2017-13765: IrCOMM dissector buffer overrun Affected versions: 2.4.0, 2.2.0 to 2.2.8, 2.0.0 to 2.0.14 Fixed versions: 2.4.1, 2.2.9, 2.0.15

oval:org.secpod.oval:def:1800147
CVE-2017-11406: DOCSIS infinite loop Affected versions: 2.2.0 to 2.2.7, 2.0.0 to 2.0.13 Fixed versions: 2.2.8, 2.0.14

oval:org.secpod.oval:def:1800273
CVE-2017-11406: DOCSIS infinite loop Affected versions: 2.2.0 to 2.2.7, 2.0.0 to 2.0.13 Fixed versions: 2.2.8, 2.0.14

oval:org.secpod.oval:def:1800852
CVE-2017-9343: MSNIP dissector crash Affected versions: 2.2.0 to 2.2.6, 2.0.0 to 2.0.12 Fixed versions: 2.2.7, 2.0.13 Reference CVE-2017-9344: BT L2CAP dissector divide by zero Affected versions: 2.2.0 to 2.2.6, 2.0.0 to 2.0.12 Fixed versions: 2.2.7, 2.0.13 Reference CVE-2017-9345: DNS dissector inf ...

oval:org.secpod.oval:def:1800138
CVE-2017-9343: MSNIP dissector crash. Affected versions: 2.2.0 to 2.2.6, 2.0.0 to 2.0.12 Fixed versions: 2.2.7, 2.0.13 Reference: CVE-2017-9344: BT L2CAP dissector divide by zero. Affected versions: 2.2.0 to 2.2.6, 2.0.0 to 2.0.12 Fixed versions: 2.2.7, 2.0.13 Reference: CVE-2017-9345: DNS dissector ...

oval:org.secpod.oval:def:1800119
CVE-2016-9374: AllJoyn crash. Affected versions: 2.2.0 to 2.2.1, 2.0.0 to 2.0.7 Fixed versions: 2.2.2, 2.0.8 Reference: CVE-2016-9376: OpenFlow crash. Affected versions: 2.2.0 to 2.2.1, 2.0.0 to 2.0.7 Fixed versions: 2.2.2, 2.0.8 Reference: CVE-2016-9373: DCERPC crash. Affected versions: 2.2.0 to 2. ...

oval:org.secpod.oval:def:1800716
CVE-2016-7175: QNX6 QNET dissector crash. Affected versions: 2.0.0 to 2.0.5 Fixed versions: 2.0.6 Reference: CVE-2016-7176: H.225 dissector crash. Affected versions: 2.0.0 to 2.0.5 Fixed versions: 2.0.6 Reference: CVE-2016-7177: Catapult DCT2000 dissector crash. Affected versions: 2.0.0 to 2.0.5 Fix ...

oval:org.secpod.oval:def:1800177
CVE-2016-6512: MMSE, WAP, WBXML, and WSP infinite loop. Affected versions: 2.0.0 to 2.0.4 Fixed versions: 2.0.5

oval:org.secpod.oval:def:1800140
CVE-2016-6505: PacketBB crash. Affected versions: 2.0.0 to 2.0.4, 1.12.0 to 1.12.12. Fixed versions: 2.0.5, 1.12.13. Reference: CVE-2016-6506: WSP infinite loop. Affected versions: 2.0.0 to 2.0.4, 1.12.0 to 1.12.12. Fixed versions: 2.0.5, 1.12.13. Reference: CVE-2016-6508:RLC long loop. Affected ver ...

oval:org.secpod.oval:def:1800615
CVE-2017-13765: IrCOMM dissector buffer overrun; Affected versions: 2.4.0, 2.2.0 to 2.2.8, 2.0.0 to 2.0.14 Fixed versions: 2.4.1, 2.2.9, 2.0.15

oval:org.secpod.oval:def:1800521
CVE-2017-15191: DMP dissector crash. Affected versions: 2.4.0 to 2.4.1, 2.2.0 to 2.2.9, 2.0.0 to 2.0.15 Fixed versions: 2.4.2, 2.2.10, 2.0.16

oval:org.secpod.oval:def:1800571
CVE-2017-13765: IrCOMM dissector buffer overrun¶ Affected versions: 2.4.0, 2.2.0 to 2.2.8, 2.0.0 to 2.0.14 Fixed versions: 2.4.1, 2.2.9, 2.0.15

oval:org.secpod.oval:def:1800483
CVE-2017-15191: DMP dissector crash¶ Affected versions: 2.4.0 to 2.4.1, 2.2.0 to 2.2.9, 2.0.0 to 2.0.15 Fixed versions: 2.4.2, 2.2.10, 2.0.16

oval:org.secpod.oval:def:1800592
CVE-2017-13765: IrCOMM dissector buffer overrun. Affected versions: 2.4.0, 2.2.0 to 2.2.8, 2.0.0 to 2.0.14 Fixed versions: 2.4.1, 2.2.9, 2.0.15

oval:org.secpod.oval:def:113740
Metapackage with installs wireshark-cli and wireshark-qt.

oval:org.secpod.oval:def:53206
It was discovered that wireshark, a network protocol analyzer, contained several vulnerabilities in the dissectors for CIP Safety, IWARP_MPA, NetBIOS, Profinet I/O and AMQP, which result in denial of dervice or the execution of arbitrary code.

oval:org.secpod.oval:def:603207
It was discovered that wireshark, a network protocol analyzer, contained several vulnerabilities in the dissectors for CIP Safety, IWARP_MPA, NetBIOS, Profinet I/O and AMQP, which result in denial of dervice or the execution of arbitrary code.

oval:org.secpod.oval:def:1800403
CVE-2017-11406: DOCSIS infinite loop Affected versions: 2.2.0 to 2.2.7, 2.0.0 to 2.0.13 Fixed versions: 2.2.8, 2.0.14

oval:org.secpod.oval:def:112998
Metapackage with installs wireshark-cli and wireshark-qt.

oval:org.secpod.oval:def:1800323
CVE-2017-11406: DOCSIS infinite loop Affected versions: 2.2.0 to 2.2.7, 2.0.0 to 2.0.13 Fixed versions: 2.2.8, 2.0.14

oval:org.secpod.oval:def:1800649
CVE-2017-9343: MSNIP dissector crash; Affected versions: 2.2.0 to 2.2.6, 2.0.0 to 2.0.12 Fixed versions: 2.2.7, 2.0.13 Reference: CVE-2017-9344: BT L2CAP dissector divide by zero; Affected versions: 2.2.0 to 2.2.6, 2.0.0 to 2.0.12 Fixed versions: 2.2.7, 2.0.13 Reference: CVE-2017-9345: DNS dissector ...

oval:org.secpod.oval:def:1800672
CVE-2017-9343: MSNIP dissector crash¶ Affected versions: 2.2.0 to 2.2.6, 2.0.0 to 2.0.12 Fixed versions: 2.2.7, 2.0.13 Reference:¶ CVE-2017-9344: BT L2CAP dissector divide by zero¶ Affected versions: 2.2.0 to 2.2.6, 2.0.0 to 2.0.12 Fixed versions: 2.2.7, 2.0.13 Reference:¶ CVE-20 ...

oval:org.secpod.oval:def:1800340
CVE-2017-7700: NetScaler file parser infinite loop. Affected versions: 2.2.0 to 2.2.5, 2.0.0 to 2.0.11 Fixed versions: 2.2.6, 2.0.12

oval:org.secpod.oval:def:1800307
CVE-2017-7700: NetScaler file parser infinite loop Affected versions: 2.2.0 to 2.2.5, 2.0.0 to 2.0.11 Fixed versions: 2.2.6, 2.0.12

oval:org.secpod.oval:def:1800386
CVE-2016-7957: Bluetooth L2CAP dissector crash Affected versions: 2.2.0 Fixed versions: 2.2.1 Reference CVE-2016-7958: NCP dissector crash Affected versions: 2.2.0 Fixed versions: 2.2.1 Reference CVE-2016-9372: Profinet I/O long loop Affected versions: 2.2.0 to 2.2.1 Fixed versions: 2.2.2 Reference ...

oval:org.secpod.oval:def:112145
Metapackage with installs wireshark-cli and wireshark-qt.

oval:org.secpod.oval:def:1800638
CVE-2017-5596: ASTERIX infinite loop. Affected versions: 2.2.0 to 2.2.3, 2.0.0 to 2.0.9 Fixed versions: 2.2.4, 2.0.10 Reference: CVE-2017-5597: DHCPv6 large loop. Affected versions: 2.2.0 to 2.2.3, 2.0.0 to 2.0.9 Fixed versions: 2.2.4, 2.0.10 Reference:

oval:org.secpod.oval:def:602816
It was discovered that wireshark, a network protocol analyzer, contained several vulnerabilities in the dissectors for ASTERIX , DHCPv6, NetScaler, LDSS, IAX2, WSP, K12 and STANAG 4607, that could lead to various crashes, denial-of-service or execution of arbitrary code.

oval:org.secpod.oval:def:112013
Metapackage with installs wireshark-cli and wireshark-qt.

oval:org.secpod.oval:def:1800563
CVE-2017-5596: ASTERIX infinite loop Affected versions: 2.2.0 to 2.2.3, 2.0.0 to 2.0.9 Fixed versions: 2.2.4, 2.0.10 Reference CVE-2017-5597: DHCPv6 large loop Affected versions: 2.2.0 to 2.2.3, 2.0.0 to 2.0.9 Fixed versions: 2.2.4, 2.0.10 Reference

oval:org.secpod.oval:def:602678
It was discovered that wireshark, a network protocol analyzer, contained several vulnerabilities in the dissectors for DCERPC, AllJoyn, DTN, and OpenFlow, that could lead to various crashes, denial-of-service, or execution of arbitrary code.

oval:org.secpod.oval:def:602619
Multiple vulnerabilities were discovered in the dissectors for H.225, Catapult DCT2000, UMTS FP and IPMI, which could result in denial of service or the execution of arbitrary code.

oval:org.secpod.oval:def:36986
The host is installed with Wireshark 2.0.x before 2.0.6 and is prone to a denial of service vulnerability. A flaw is present in the IPMI trace dissector, which does not properly consider whether a string is constant. Successful exploitation allows remote attackers to cause a denial of service (use-a ...

oval:org.secpod.oval:def:36985
The host is installed with Wireshark 2.0.x before 2.0.6 and is prone to a denial of service vulnerability. A flaw is present in the Catapult DCT2000 dissector, which fails to handle a malformed packet. Successful exploitation allows remote attackers to cause a denial of service (application crash).

oval:org.secpod.oval:def:36984
The host is installed with Wireshark 2.0.x before 2.0.6 and is prone to a denial of service vulnerability. A flaw is present in the UMTS FP dissector, which does not ensure that memory is allocated for certain data structures. Successful exploitation allows remote attackers to cause a denial of serv ...

oval:org.secpod.oval:def:36983
The host is installed with Wireshark 2.0.x before 2.0.6 and is prone to a denial of service vulnerability. A flaw is present in the Catapult DCT2000 dissector, which does not restrict the number of channels. Successful exploitation allows remote attackers to cause a denial of service (buffer over-re ...

oval:org.secpod.oval:def:36982
The host is installed with Wireshark 2.0.x before 2.0.6 and is prone to a denial of service vulnerability. A flaw is present in the H.225 dissector, which calls snprintf with one of its input buffers as the output buffer. Successful exploitation allows remote attackers to cause a denial of service ( ...

oval:org.secpod.oval:def:36976
The host is installed with Wireshark 2.0.x before 2.0.6 and is prone to a denial of service vulnerability. A flaw is present in the IPMI trace dissector, which does not properly consider whether a string is constant. Successful exploitation allows remote attackers to cause a denial of service (use-a ...

oval:org.secpod.oval:def:36975
The host is installed with Wireshark 2.0.x before 2.0.6 and is prone to a denial of service vulnerability. A flaw is present in the Catapult DCT2000 dissector, which fails to handle a malformed packet. Successful exploitation allows remote attackers to cause a denial of service (application crash).

oval:org.secpod.oval:def:36974
The host is installed with Wireshark 2.0.x before 2.0.6 and is prone to a denial of service vulnerability. A flaw is present in the UMTS FP dissector, which does not ensure that memory is allocated for certain data structures. Successful exploitation allows remote attackers to cause a denial of serv ...

oval:org.secpod.oval:def:36973
The host is installed with Wireshark 2.0.x before 2.0.6 and is prone to a denial of service vulnerability. A flaw is present in the Catapult DCT2000 dissector, which does not restrict the number of channels. Successful exploitation allows remote attackers to cause a denial of service (buffer over-re ...

oval:org.secpod.oval:def:36972
The host is installed with Wireshark 2.0.x before 2.0.6 and is prone to a denial of service vulnerability. A flaw is present in the H.225 dissector, which calls snprintf with one of its input buffers as the output buffer. Successful exploitation allows remote attackers to cause a denial of service ( ...

oval:org.secpod.oval:def:36981
The host is installed with Wireshark 2.0.x before 2.0.6 and is prone to a denial of service vulnerability. A flaw is present in the QNX6 QNET dissector, which fails to handle a malformed packet. Successful exploitation allows remote attackers to cause a denial of service (out-of-bounds read and appl ...

oval:org.secpod.oval:def:36971
The host is installed with Wireshark 2.0.x before 2.0.6 and is prone to a denial of service vulnerability. A flaw is present in the QNX6 QNET dissector, which fails to handle a malformed packet. Successful exploitation allows remote attackers to cause a denial of service (out-of-bounds read and appl ...

oval:org.secpod.oval:def:36697
The host is installed with Wireshark 2.0.x before 2.0.5 and is prone to a denial of service vulnerability. A flaw is present in the WBXML dissector, which fails to handle a crafted packet. Successful exploitation allows remote attackers to cause a denial of service (application crash).

oval:org.secpod.oval:def:36696
The host is installed with Wireshark 2.0.x before 2.0.5 and is prone to a denial of service vulnerability. A flaw is present in the tvb_get_guintvar function, which fails to handle a crafted packet. Successful exploitation allows remote attackers to cause a denial of service (infinite loop).

oval:org.secpod.oval:def:36707
The host is installed with Wireshark 2.0.x before 2.0.5 and is prone to a denial of service vulnerability. A flaw is present in the WBXML dissector, which fails to handle a crafted packet. Successful exploitation allows remote attackers to cause a denial of service (application crash).

oval:org.secpod.oval:def:36706
The host is installed with Wireshark 2.0.x before 2.0.5 and is prone to a denial of service vulnerability. A flaw is present in the tvb_get_guintvar function, which fails to handle a crafted packet. Successful exploitation allows remote attackers to cause a denial of service (infinite loop).

oval:org.secpod.oval:def:1800504
CVE-2016-6505: PacketBB crash Affected versions: 2.0.0 to 2.0.4, 1.12.0 to 1.12.12 Fixed versions: 2.0.5, 1.12.13 Reference CVE-2016-6506: WSP infinite loop Affected versions: 2.0.0 to 2.0.4, 1.12.0 to 1.12.12 Fixed versions: 2.0.5, 1.12.13 Reference CVE-2016-6508:RLC long loop Affected versions: 2. ...

oval:org.secpod.oval:def:36692
The host is installed with Wireshark 1.12.x before 1.12.13 or 2.0.x before 2.0.5 and is prone to a denial of service vulnerability. A flaw is present in the RLC dissector, which fails to handle a crafted packet which uses an incorrect integer data type. Successful exploitation allows remote attacker ...

oval:org.secpod.oval:def:36695
The host is installed with Wireshark 1.12.x before 1.12.13 or 2.0.x before 2.0.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted packet. Successful exploitation allows remote attackers to cause a denial of service (OpenFlow dis ...

oval:org.secpod.oval:def:36694
The host is installed with Wireshark 1.12.x before 1.12.13 or 2.0.x before 2.0.5 and is prone to a denial of service vulnerability. A flaw is present in the RLC dissector, which fails to handle a crafted packet. Successful exploitation allows remote attackers to cause a denial of service (stack-base ...

oval:org.secpod.oval:def:36693
The host is installed with Wireshark 1.12.x before 1.12.13 or 2.0.x before 2.0.5 and is prone to a denial of service vulnerability. A flaw is present in the LDSS dissector, which fails to handle a crafted packet and conversations. Successful exploitation allows remote attackers to cause a denial of ...

oval:org.secpod.oval:def:36705
The host is installed with Wireshark 1.12.x before 1.12.13 or 2.0.x before 2.0.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted packet. Successful exploitation allows remote attackers to cause a denial of service (OpenFlow dis ...

oval:org.secpod.oval:def:36704
The host is installed with Wireshark 1.12.x before 1.12.13 or 2.0.x before 2.0.5 and is prone to a denial of service vulnerability. A flaw is present in the RLC dissector, which fails to handle a crafted packet. Successful exploitation allows remote attackers to cause a denial of service (stack-base ...

oval:org.secpod.oval:def:36703
The host is installed with Wireshark 1.12.x before 1.12.13 or 2.0.x before 2.0.5 and is prone to a denial of service vulnerability. A flaw is present in the LDSS dissector, which fails to handle a crafted packet and conversations. Successful exploitation allows remote attackers to cause a denial of ...

oval:org.secpod.oval:def:36702
The host is installed with Wireshark 1.12.x before 1.12.13 or 2.0.x before 2.0.5 and is prone to a denial of service vulnerability. A flaw is present in the RLC dissector, which fails to handle a crafted packet which uses an incorrect integer data type. Successful exploitation allows remote attacker ...

oval:org.secpod.oval:def:36691
The host is installed with Wireshark 1.12.x before 1.12.13 and is prone to a denial of service vulnerability. A flaw is present in the MMSE dissector, which fails to handle a crafted packet. Successful exploitation allows remote attackers to cause a denial of service (infinite loop).

oval:org.secpod.oval:def:36690
The host is installed with Wireshark 1.12.x before 1.12.13 or 2.0.x before 2.0.5 and is prone to a denial of service vulnerability. A flaw is present in the WSP dissector, which fails to handle a crafted packet. Successful exploitation allows remote attackers to cause a denial of service (infinite l ...

oval:org.secpod.oval:def:36699
The host is installed with Wireshark 1.12.x before 1.12.13 or 2.0.x before 2.0.5 and is prone to a denial of service vulnerability. A flaw is present in the PacketBB dissector, which fails to handle a crafted packet. Successful exploitation allows remote attackers to cause a denial of service (divid ...

oval:org.secpod.oval:def:36689
The host is installed with Wireshark 1.12.x before 1.12.13 or 2.0.x before 2.0.5 and is prone to a denial of service vulnerability. A flaw is present in the PacketBB dissector, which fails to handle a crafted packet. Successful exploitation allows remote attackers to cause a denial of service (divid ...

oval:org.secpod.oval:def:36687
The host is installed with Wireshark 2.0.x before 2.0.5 and is prone to a denial of service vulnerability. A flaw is present in the CORBA IDL dissector, which fails to properly interact with visual C++ compiler options. Successful exploitation which allows remote attackers to cause a denial of servi ...

oval:org.secpod.oval:def:36700
The host is installed with Wireshark 1.12.x before 1.12.13 or 2.0.x before 2.0.5 and is prone to a denial of service vulnerability. A flaw is present in the WSP dissector, which fails to handle a crafted packet. Successful exploitation allows remote attackers to cause a denial of service (infinite l ...

oval:org.secpod.oval:def:36701
The host is installed with Wireshark 1.12.x before 1.12.13 and is prone to a denial of service vulnerability. A flaw is present in the MMSE dissector, which fails to handle a crafted packet. Successful exploitation allows remote attackers to cause a denial of service (infinite loop).

oval:org.secpod.oval:def:34145
The host is installed with Wireshark 1.12.x before 1.12.11 and is prone to a stack-based buffer overflow vulnerability. A flaw is present in the NCP dissector, which fails to handle a long string in a packet. Successful exploitation could allow remote attackers to cause a denial of service (applicat ...

oval:org.secpod.oval:def:34143
The host is installed with Wireshark 2.0.x before 2.0.3 and is prone to a denial of service vulnerability. A flaw is present in the MS-WSP dissector, which fails to ensure that data is available before array allocation. Successful exploitation allows remote attackers to cause a denial of service (ap ...

oval:org.secpod.oval:def:34144
The host is installed with Wireshark 2.0.x before 2.0.3 and is prone to a denial of service vulnerability. A flaw is present in the MS-WSP dissector, which fails to handle a crafted packet that triggers an unexpected array size. Successful exploitation allows remote attackers to cause a denial of se ...

oval:org.secpod.oval:def:34142
The host is installed with Wireshark 1.12.x before 1.12.11 or 2.0.x before 2.0.3 and is prone to a denial of service vulnerability. A flaw is present in the GSM CBCH dissector, which uses the wrong variable to index an array. Successful exploitation allows remote attackers to cause a denial of servi ...

oval:org.secpod.oval:def:34134
The host is installed with Wireshark 1.12.x before 1.12.11 and is prone to a stack-based buffer overflow vulnerability. A flaw is present in the NCP dissector, which fails to handle a long string in a packet. Successful exploitation could allow remote attackers to cause a denial of service (applicat ...

oval:org.secpod.oval:def:34132
The host is installed with Wireshark 2.0.x before 2.0.3 and is prone to a denial of service vulnerability. A flaw is present in the MS-WSP dissector, which fails to ensure that data is available before array allocation. Successful exploitation allows remote attackers to cause a denial of service (ap ...

oval:org.secpod.oval:def:34133
The host is installed with Wireshark 2.0.x before 2.0.3 and is prone to a denial of service vulnerability. A flaw is present in the MS-WSP dissector, which fails to handle a crafted packet that triggers an unexpected array size. Successful exploitation allows remote attackers to cause a denial of se ...

oval:org.secpod.oval:def:34131
The host is installed with Wireshark 1.12.x before 1.12.11 or 2.0.x before 2.0.3 and is prone to a denial of service vulnerability. A flaw is present in the GSM CBCH dissector, which uses the wrong variable to index an array. Successful exploitation allows remote attackers to cause a denial of servi ...

oval:org.secpod.oval:def:34126
The host is installed with Wireshark 2.0.x before 2.0.3 and is prone to a denial of service vulnerability. A flaw is present in the TShark, which relies on incorrect special-case handling of truncated Tvb data structures. Successful exploitation allows remote attackers to cause a denial of service ( ...

oval:org.secpod.oval:def:34140
The host is installed with Wireshark 1.12.x before 1.12.11 or 2.0.x before 2.0.3 and is prone to a denial of service vulnerability. A flaw is present in the PKTC dissector, which misparses timestamp fields. Successful exploitation allows remote attackers to cause a denial of service (out-of-bounds r ...

oval:org.secpod.oval:def:34141
The host is installed with Wireshark 1.12.x before 1.12.11 or 2.0.x before 2.0.3 and is prone to a denial of service vulnerability. A flaw is present in the IAX2 dissector, which uses an incorrect integer data type. Successful exploitation allows remote attackers to cause a denial of service (infini ...

oval:org.secpod.oval:def:34138
The host is installed with Wireshark 1.12.x before 1.12.11 or 2.0.x before 2.0.3 and is prone to a denial of service vulnerability. A flaw is present in the IEEE 802.11 dissector, related to epan/dissectors/packet-capwap.c and epan/dissectors/packet-ieee80211.c, which fails to properly restrict elem ...

oval:org.secpod.oval:def:34139
The host is installed with Wireshark 1.12.x before 1.12.11 or 2.0.x before 2.0.3 and is prone to a denial of service vulnerability. A flaw is present in the PKTC dissector, which fails to verify BER identifiers. Successful exploitation allows remote attackers to cause a denial of service (out-of-bou ...

oval:org.secpod.oval:def:34137
The host is installed with Wireshark 2.0.x before 2.0.3 and is prone to a denial of service vulnerability. A flaw is present in the TShark, which relies on incorrect special-case handling of truncated Tvb data structures. Successful exploitation allows remote attackers to cause a denial of service ( ...

oval:org.secpod.oval:def:34130
The host is installed with Wireshark 1.12.x before 1.12.11 or 2.0.x before 2.0.3 and is prone to a denial of service vulnerability. A flaw is present in the IAX2 dissector, which uses an incorrect integer data type. Successful exploitation allows remote attackers to cause a denial of service (infini ...

oval:org.secpod.oval:def:34129
The host is installed with Wireshark 1.12.x before 1.12.11 or 2.0.x before 2.0.3 and is prone to a denial of service vulnerability. A flaw is present in the PKTC dissector, which misparses timestamp fields. Successful exploitation allows remote attackers to cause a denial of service (out-of-bounds r ...

oval:org.secpod.oval:def:34127
The host is installed with Wireshark 1.12.x before 1.12.11 or 2.0.x before 2.0.3 and is prone to a denial of service vulnerability. A flaw is present in the IEEE 802.11 dissector, related to epan/dissectors/packet-capwap.c and epan/dissectors/packet-ieee80211.c, which fails to properly restrict elem ...

oval:org.secpod.oval:def:34128
The host is installed with Wireshark 1.12.x before 1.12.11 or 2.0.x before 2.0.3 and is prone to a denial of service vulnerability. A flaw is present in the PKTC dissector, which fails to verify BER identifiers. Successful exploitation allows remote attackers to cause a denial of service (out-of-bou ...

oval:org.secpod.oval:def:34125
The host is installed with Wireshark 2.0.x before 2.0.3 and is prone to a denial of service vulnerability. A flaw is present in the NCP dissector, which fails to properly initialize memory for search patterns. Successful exploitation allows remote attackers to cause a denial of service (application ...

oval:org.secpod.oval:def:34124
The host is installed with Wireshark 1.12.x before 1.12.11 or 2.0.x before 2.0.3 and is prone to a denial of service vulnerability. A flaw is present in the epan/proto.c, which fails to properly limit the protocol-tree depth. Successful exploitation allows remote attackers to cause a denial of servi ...

oval:org.secpod.oval:def:34136
The host is installed with Wireshark 2.0.x before 2.0.3 and is prone to a denial of service vulnerability. A flaw is present in the NCP dissector, which fails to properly initialize memory for search patterns. Successful exploitation allows remote attackers to cause a denial of service (application ...

oval:org.secpod.oval:def:34135
The host is installed with Wireshark 1.12.x before 1.12.11 or 2.0.x before 2.0.3 and is prone to a denial of service vulnerability. A flaw is present in the epan/proto.c, which fails to properly limit the protocol-tree depth. Successful exploitation allows remote attackers to cause a denial of servi ...

oval:org.secpod.oval:def:602419
Multiple vulnerabilities were discovered in the dissectors/parsers for DNP, RSL, LLRP, GSM A-bis OML, ASN 1 BER which could result in denial of service.

oval:org.secpod.oval:def:32533
The host is installed with Wireshark 2.0.x before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which does not validate the number of columns. Successful exploitation allows remote attackers to cause a denial of service (stack-based buffer overflow and ...

oval:org.secpod.oval:def:32532
The host is installed with Wireshark 2.0.x before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which does not initialize a packet-header data structure. Successful exploitation allows remote attackers to cause a denial of service (application crash).

oval:org.secpod.oval:def:32530
The host is installed with Wireshark 2.0.x before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which does not validate the column size. Successful exploitation allows remote attackers to cause a denial of service (memory consumption or application cras ...

oval:org.secpod.oval:def:32496
The host is installed with Wireshark 2.0.x before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which does not validate the column size. Successful exploitation allows remote attackers to cause a denial of service (memory consumption or application cras ...

oval:org.secpod.oval:def:32498
The host is installed with Wireshark 2.0.x before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which does not validate the number of columns. Successful exploitation allows remote attackers to cause a denial of service (stack-based buffer overflow and ...

oval:org.secpod.oval:def:32497
The host is installed with Wireshark 2.0.x before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which does not initialize a packet-header data structure. Successful exploitation allows remote attackers to cause a denial of service (application crash).

oval:org.secpod.oval:def:32537
The host is installed with Wireshark 2.0.x before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which does not reserve memory for a trailer. Successful exploitation allows remote attackers to cause a denial of service (stack-based buffer overflow and ap ...

oval:org.secpod.oval:def:32536
The host is installed with Wireshark 2.0.x before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which does not validate the bit rate. Successful exploitation allows remote attackers to cause a denial of service (divide-by-zero error and application cras ...

oval:org.secpod.oval:def:32538
The host is installed with Wireshark 2.0.x before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which uses an incorrect integer data type. Successful exploitation allows remote attackers to cause a denial of service (invalid write operation and applicat ...

oval:org.secpod.oval:def:32535
The host is installed with Wireshark 2.0.x before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which does not validate the list count in an SZL response. Successful exploitation allows remote attackers to cause a denial of service (divide-by-zero error ...

oval:org.secpod.oval:def:32534
The host is installed with Wireshark 2.0.x before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which improperly attempts to access a packet scope. Successful exploitation allows remote attackers to cause a denial of service (assertion failure and appli ...

oval:org.secpod.oval:def:32503
The host is installed with Wireshark 2.0.x before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which uses an incorrect integer data type. Successful exploitation allows remote attackers to cause a denial of service (invalid write operation and applicat ...

oval:org.secpod.oval:def:32500
The host is installed with Wireshark 2.0.x before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which does not validate the list count in an SZL response. Successful exploitation allows remote attackers to cause a denial of service (divide-by-zero error ...

oval:org.secpod.oval:def:32502
The host is installed with Wireshark 2.0.x before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which does not reserve memory for a trailer. Successful exploitation allows remote attackers to cause a denial of service (stack-based buffer overflow and ap ...

oval:org.secpod.oval:def:32501
The host is installed with Wireshark 2.0.x before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which does not validate the bit rate. Successful exploitation allows remote attackers to cause a denial of service (divide-by-zero error and application cras ...

oval:org.secpod.oval:def:32499
The host is installed with Wireshark 2.0.x before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which improperly attempts to access a packet scope. Successful exploitation allows remote attackers to cause a denial of service (assertion failure and appli ...

oval:org.secpod.oval:def:32540
The host is installed with Wireshark 1.12.x before 1.12.9 or 2.0.x before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which does not validate the relationships between record lengths and record header lengths. Successful exploitation could allow attac ...

oval:org.secpod.oval:def:32542
The host is installed with Wireshark 1.12.x before 1.12.9 or 2.0.x before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which does not reject unknown TLV types. Successful exploitation could allow attackers to cause a denial of service (out-of-bounds re ...

oval:org.secpod.oval:def:32541
The host is installed with Wireshark 1.12.x before 1.12.9 or 2.0.x before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which does not validate the Total Profile Number field. Successful exploitation could allow attackers to cause a denial of service (o ...

oval:org.secpod.oval:def:32539
The host is installed with Wireshark 2.0.x before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which mishandles the packet type. Successful exploitation allows remote attackers to cause a denial of service (application crash).

oval:org.secpod.oval:def:32504
The host is installed with Wireshark 2.0.x before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which mishandles the packet type. Successful exploitation allows remote attackers to cause a denial of service (application crash).

oval:org.secpod.oval:def:32506
The host is installed with Wireshark 1.12.x before 1.12.9 or 2.0.x before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which does not validate the Total Profile Number field. Successful exploitation could allow attackers to cause a denial of service (o ...

oval:org.secpod.oval:def:32505
The host is installed with Wireshark 1.12.x before 1.12.9 or 2.0.x before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which does not validate the relationships between record lengths and record header lengths. Successful exploitation could allow attac ...

oval:org.secpod.oval:def:32508
The host is installed with Wireshark 1.12.x before 1.12.9 or 2.0.x before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which does not validate the number of items. Successful exploitation could allow attackers to cause a denial of service (invalid read ...

oval:org.secpod.oval:def:32507
The host is installed with Wireshark 1.12.x before 1.12.9 or 2.0.x before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which does not reject unknown TLV types. Successful exploitation could allow attackers to cause a denial of service (out-of-bounds re ...

oval:org.secpod.oval:def:32543
The host is installed with Wireshark 1.12.x before 1.12.9 or 2.0.x before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which does not validate the number of items. Successful exploitation could allow attackers to cause a denial of service (invalid read ...

oval:org.secpod.oval:def:32511
The host is installed with Wireshark 1.12.x before 1.12.9 or 2.0.x before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which does not properly maintain request-key data. Successful exploitation could allow attackers to cause a denial of service (use-af ...

oval:org.secpod.oval:def:32510
The host is installed with Wireshark 1.12.x before 1.12.9 or 2.0.x before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which improperly uses the tvb_bcd_dig_to_wmem_packet_str function. Successful exploitation could allow attackers to cause a denial of ...

oval:org.secpod.oval:def:32512
The host is installed with Wireshark 1.12.x before 1.12.9 or 2.0.x before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which does not validate certain signature and Modulation and Coding Scheme (MCS) data. Successful exploitation could allow attackers ...

oval:org.secpod.oval:def:32509
The host is installed with Wireshark 1.12.x before 1.12.9 or 2.0.x before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which does not ensure the presence of a '\0' character at the end of a date string. Successful exploitation could allow attackers to ...

oval:org.secpod.oval:def:32547
The host is installed with Wireshark 1.12.x before 1.12.9 or 2.0.x before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which does not validate certain signature and Modulation and Coding Scheme (MCS) data. Successful exploitation could allow attackers ...

oval:org.secpod.oval:def:32544
The host is installed with Wireshark 1.12.x before 1.12.9 or 2.0.x before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which does not ensure the presence of a '\0' character at the end of a date string. Successful exploitation could allow attackers to ...

oval:org.secpod.oval:def:32546
The host is installed with Wireshark 1.12.x before 1.12.9 or 2.0.x before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which does not properly maintain request-key data. Successful exploitation could allow attackers to cause a denial of service (use-af ...

oval:org.secpod.oval:def:32545
The host is installed with Wireshark 1.12.x before 1.12.9 or 2.0.x before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which improperly uses the tvb_bcd_dig_to_wmem_packet_str function. Successful exploitation could allow attackers to cause a denial of ...

oval:org.secpod.oval:def:32514
The host is installed with Wireshark 1.12.x before 1.12.9 or 2.0.x before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which does not verify the WPA broadcast key length. Successful exploitation could allow attackers to cause a denial of service (out-o ...

oval:org.secpod.oval:def:32516
The host is installed with Wireshark 1.12.x before 1.12.9 or 2.0.x before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which does not validate the frame pointer. Successful exploitation could allow attackers to cause a denial of service (NULL pointer d ...

oval:org.secpod.oval:def:32513
The host is installed with Wireshark 1.12.x before 1.12.9 or 2.0.x before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which does not validate the IPv6 prefix length. Successful exploitation could allow attackers to cause a denial of service (stack-bas ...

oval:org.secpod.oval:def:32551
The host is installed with Wireshark 1.12.x before 1.12.9 or 2.0.x before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which does not validate the frame pointer. Successful exploitation could allow attackers to cause a denial of service (NULL pointer d ...

oval:org.secpod.oval:def:32548
The host is installed with Wireshark 1.12.x before 1.12.9 or 2.0.x before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which does not validate the IPv6 prefix length. Successful exploitation could allow attackers to cause a denial of service (stack-bas ...

oval:org.secpod.oval:def:32549
The host is installed with Wireshark 1.12.x before 1.12.9 or 2.0.x before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which does not verify the WPA broadcast key length. Successful exploitation could allow attackers to cause a denial of service (out-o ...

oval:org.secpod.oval:def:32522
The host is installed with Wireshark 1.12.x before 1.12.9 and is prone to denial of service vulnerability. A flaw is present in the application, which does not ensure that a conversation exists. Successful exploitation allows remote attackers to cause a denial of service (application crash).

oval:org.secpod.oval:def:32520
The host is installed with Wireshark 1.12.x before 1.12.9 or 2.0.x before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which enables "Match MSG/RES packets for async NLM" option. Successful exploitation could allow attackers to cause a denial of servic ...

oval:org.secpod.oval:def:32555
The host is installed with Wireshark 1.12.x before 1.12.9 or 2.0.x before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which enables "Match MSG/RES packets for async NLM" option. Successful exploitation could allow attackers to cause a denial of servic ...

oval:org.secpod.oval:def:32557
The host is installed with Wireshark 1.12.x before 1.12.9 and is prone to denial of service vulnerability. A flaw is present in the application, which does not ensure that a conversation exists. Successful exploitation allows remote attackers to cause a denial of service (application crash).

oval:org.secpod.oval:def:32527
The host is installed with Wireshark 1.12.x before 1.12.9 or 2.0.x before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which does not validate conversation data. Successful exploitation allows remote attackers to cause a denial of service (NULL pointer ...

oval:org.secpod.oval:def:32562
The host is installed with Wireshark 1.12.x before 1.12.9 or 2.0.x before 2.0.1 and is prone to denial of service vulnerability. A flaw is present in the application, which does not validate conversation data. Successful exploitation allows remote attackers to cause a denial of service (NULL pointer ...

oval:org.secpod.oval:def:602421
Multiple vulnerabilities were discovered in the dissectors/parsers for Pcapng, NBAP, UMTS FP, DCOM, AllJoyn, T.38, SDP, NLM, DNS, BED, SCTP, 802.11, DIAMETER, VeriWave, RVSP, ANSi A, GSM A, Ascend, NBAP, ZigBee ZCL and Sniffer which could result in denial of service.

oval:org.secpod.oval:def:114876
Metapackage with installs wireshark-cli and wireshark-qt.

oval:org.secpod.oval:def:114600
Metapackage with installs wireshark-cli and wireshark-qt.

CVE    120
CVE-2016-2530
CVE-2016-2531
CVE-2016-2532
CVE-2016-2524
...
*CPE
cpe:/a:wireshark:wireshark:2.0.0

© SecPod Technologies