Download
| Alert*
oval:org.secpod.oval:def:24528
The host is installed with Wireshark 1.12.x before 1.12.5 and is prone to denial of service vulnerability. A flaw is present in the application, which does not reject a zero length. Successful exploitation allows remote attackers to cause a denial of service (infinite loop). oval:org.secpod.oval:def:24526 The host is installed with Wireshark 1.10.x before 1.10.14 or 1.12.x before 1.12.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which improperly refers to previously processed bytes. Successful exploitation allows remote attackers to cause a denial of serv ... oval:org.secpod.oval:def:24527 The host is installed with Wireshark 1.10.x before 1.10.14 or 1.12.x before 1.12.5 and is prone to multiple memory leak vulnerabilities. The flaws are present in the application, which fails to handle a crafted packet. Successful exploitation allows remote attackers to cause a denial of service (mem ... oval:org.secpod.oval:def:24529 The host is installed with Wireshark 1.12.x before 1.12.5 and is prone to denial of service vulnerability. A flaw is present in the application, which does not properly track the current offset. Successful exploitation allows remote attackers to cause a denial of service (infinite loop). oval:org.secpod.oval:def:24532 The host is installed with Wireshark 1.10.x before 1.10.14 or 1.12.x before 1.12.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which interprets a zero value as a length rather than an error condition. Successful exploitation allows remote attackers to cau ... oval:org.secpod.oval:def:24530 The host is installed with Wireshark 1.12.x before 1.12.5 and is prone to denial of service vulnerability. A flaw is present in the application, which uses a recursive algorithm. Successful exploitation allows remote attackers to cause a denial of service (CPU consumption). oval:org.secpod.oval:def:17062 The host is installed with Wireshark 1.10.0 before 1.10.6 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a malformed packet trace file. Successful exploitation could allow attackers to make Wireshark crash by injecting a malfor ... oval:org.secpod.oval:def:20057 The host is installed with Wireshark 1.10.x before 1.10.4 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted packet-trace file that includes a large packet. Successful exploitation allows attackers to execute arbitrary code or cause ... oval:org.secpod.oval:def:40849 The host is installed Wireshark 1.10.x before 1.10.1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a crafted packet. Successful exploitation allows remote attackers to cause a denial of service (application crash). oval:org.secpod.oval:def:40850 The host is installed Wireshark 1.10.x before 1.10.1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a crafted packet. Successful exploitation allows remote attackers to cause a denial of service (application crash). oval:org.secpod.oval:def:40851 The host is installed Wireshark 1.10.x before 1.10.1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a crafted packet. Successful exploitation allows remote attackers to cause a denial of service (application crash). oval:org.secpod.oval:def:40854 The host is installed Wireshark 1.10.x before 1.10.1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a crafted packet. Successful exploitation allows remote attackers to cause a denial of service (assertion failure and applicati ... oval:org.secpod.oval:def:40855 The host is installed Wireshark 1.10.x before 1.10.1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly determine whether there is remaining packet data to process. Successful exploitation allows remote attackers to cause a denial of serv ... oval:org.secpod.oval:def:40852 The host is installed Wireshark 1.10.x before 1.10.1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a crafted packet. Successful exploitation allows remote attackers to cause a denial of service (application crash). oval:org.secpod.oval:def:40853 The host is installed Wireshark 1.10.x before 1.10.1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly validate certain index values. Successful exploitation allows remote attackers to cause a denial of service (assertion failure and app ... oval:org.secpod.oval:def:40858 The host is installed Wireshark 1.8.x before 1.8.9 or 1.10.x before 1.10.1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly determine whether there is remaining packet data to process. Successful exploitation allows remote attackers to ... oval:org.secpod.oval:def:40859 The host is installed Wireshark 1.8.x before 1.8.9 or 1.10.x before 1.10.1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly determine whether there is remaining packet data to process. Successful exploitation allows remote attackers to ... oval:org.secpod.oval:def:40857 The host is installed Wireshark 1.10.x before 1.10.1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly determine whether there is remaining packet data to process. Successful exploitation allows remote attackers to cause a denial of serv ... oval:org.secpod.oval:def:15586 The host is installed with Wireshark 1.8.x before 1.8.10 or 1.10.x before 1.10.2 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to restrict the dch_id value. Successful exploitation allows attackers to cause application crash. oval:org.secpod.oval:def:16434 The host is installed with Wireshark 1.10.x before 1.10.4 and is prone to denial of service vulnerability. A flaw is present in the application, which incorrectly relies on a global variable. Successful exploitation allows attackers to cause application crash via a crafted packet. oval:org.secpod.oval:def:601105 Multiple vulnerabilities were discovered in the dissectors for LDAP, RTPS and NBAP and in the Netmon file parser, which could result in denial of service or the execution of arbitrary code. oval:org.secpod.oval:def:15584 The host is installed with Wireshark 1.10.x before 1.10.2 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly maintain a certain free list. Successful exploitation allows attackers to cause application crash. oval:org.secpod.oval:def:40865 The host is installed Wireshark 1.10.x before 1.10.1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a crafted packet. Successful exploitation allows remote attackers to cause a denial of service (NULL pointer dereference and ap ... oval:org.secpod.oval:def:15588 The host is installed with Wireshark 1.8.x before 1.8.10 or 1.10.x before 1.10.2 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle crafted packet. Successful exploitation allows attackers to cause application crash. oval:org.secpod.oval:def:16435 The host is installed with Wireshark 1.8.x before 1.8.12 or 1.10.x before 1.10.4 and is prone to multiple buffer overflow vulnerabilities. The flaws are present in the application, which fails to handle a long domain name in a packet. Successful exploitation allows attackers to cause application cra ... oval:org.secpod.oval:def:15589 The host is installed with Wireshark 1.8.x before 1.8.10 or 1.10.x before 1.10.2 and is prone to buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted packet. Successful exploitation allows attackers to cause application crash. oval:org.secpod.oval:def:16004 The host is installed with Wireshark 1.8.x before 1.8.11 or 1.10.x before 1.10.3 and is prone to spoofing vulnerability. The flaw is present in the ieee802154_map_rec function in epan/dissectors/packet-ieee802154.c in the IEEE 802.15.4 dissecto, which fails to properly handle a crafted packet. Succe ... oval:org.secpod.oval:def:15597 The host is installed with Wireshark 1.8.x before 1.8.10 or 1.10.x before 1.10.2 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to properly handle crafted packet. Successful exploitation allows attackers to cause application crash. oval:org.secpod.oval:def:16002 The host is installed with Wireshark 1.8.x before 1.8.11 or 1.10.x before 1.10.3 and is prone to denial of service vulnerability. The flaw is present in the dissect_sip_common function in epan/dissectors/packet-sip.c in the SIP dissector, which fails to properly initialize a data structure. Successf ... oval:org.secpod.oval:def:15595 The host is installed with Wireshark 1.8.x before 1.8.10 or 1.10.x before 1.10.2 and is prone to buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted packet. Successful exploitation allows attackers to cause application crash. oval:org.secpod.oval:def:16003 The host is installed with Wireshark 1.8.x before 1.8.11 or 1.10.x before 1.10.3 and is prone to unspecified vulnerability. The flaw is present in the in the NBAP dissector, which fails to handle a crafted packet. Successful exploitation allows remote attackers to cause a denial of service (applicat ... oval:org.secpod.oval:def:16000 The host is installed with Wireshark 1.8.x before 1.8.11 or 1.10.x before 1.10.3 and is prone to denial of service vulnerability. The flaw is present in the epan/dissectors/packet-tcp.c in the TCP dissector, which does not properly determine the amount of remaining data. Successful exploitation allo ... oval:org.secpod.oval:def:15593 The host is installed with Wireshark 1.8.x before 1.8.10 or 1.10.x before 1.10.2 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to restrict the dch_id value. Successful exploitation allows attackers to cause application crash. oval:org.secpod.oval:def:16001 The host is installed with Wireshark 1.8.x before 1.8.11 or 1.10.x before 1.10.3 and is prone to denial of service vulnerability. The flaw is present in the dissect_openwire_type function in epan/dissectors/packet-openwire.c in the OpenWire dissector, which fails to properly handle a crafted packet. ... oval:org.secpod.oval:def:15594 The host is installed with Wireshark 1.8.x before 1.8.10 or 1.10.x before 1.10.2 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle crafted packet. Successful exploitation allows attackers to cause application crash. oval:org.secpod.oval:def:15591 The host is installed with Wireshark 1.8.x before 1.8.10 or 1.10.x before 1.10.2 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to properly handle crafted packet. Successful exploitation allows attackers to cause application crash. oval:org.secpod.oval:def:15592 The host is installed with Wireshark 1.10.x before 1.10.2 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly maintain a certain free list. Successful exploitation allows attackers to cause application crash. oval:org.secpod.oval:def:15585 Wireshark 1.10.x is installed oval:org.secpod.oval:def:32563 The host is installed with Wireshark 1.10.12 through 1.10.14 and is prone to a denial of service vulnerability. A flaw is present in the application, which mishandles a certain strdup return value. Successful exploitation could allow attackers to cause a denial of service (application crash). oval:org.secpod.oval:def:17061 The host is installed with Wireshark 1.10.0 before 1.10.6 or 1.8.0 before 1.8.13 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a malformed packet trace file. Successful exploitation could allow attackers to make Wireshark cras ... oval:org.secpod.oval:def:20058 The host is installed with Wireshark 1.10.x before 1.10.8 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted packet. Successful exploitation allows attackers to cause a denial of service (application crash). oval:org.secpod.oval:def:19903 The host is installed with Wireshark 1.10.x before 1.10.7 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a crafted packet. Successful exploitation could allow attackers to cause a denial of service (application crash). oval:org.secpod.oval:def:501147 Wireshark, previously known as Ethereal, is a network protocol analyzer. It is used to capture and browse the traffic running on a computer network. Two flaws were found in Wireshark. If Wireshark read a malformed packet off a network or opened a malicious dump file, it could crash or, possibly, exe ... oval:org.secpod.oval:def:17063 The host is installed with Wireshark 1.10.0 before 1.10.6 or 1.8.0 before 1.8.13 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a malformed packet trace file. Successful exploitation could allow attackers to make Wireshark cras ... oval:org.secpod.oval:def:17060 The host is installed with Wireshark 1.10.0 before 1.10.6 or 1.8.0 before 1.8.13 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle a malformed packet trace file. Successful exploitation could allow attackers to execute malicious cod ... oval:org.secpod.oval:def:40856 The host is installed Wireshark 1.8.x before 1.8.9 or 1.10.x before 1.10.1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly determine whether there is remaining packet data to process. Successful exploitation allows remote attackers to ... oval:org.secpod.oval:def:203233 Wireshark is a network protocol analyzer. It is used to capture and browse the traffic running on a computer network. Multiple flaws were found in Wireshark. If Wireshark read a malformed packet off a network or opened a malicious dump file, it could crash or, possibly, execute arbitrary code as the ... oval:org.secpod.oval:def:1500299 Updated wireshark packages that fix multiple security issues, several bugs, and add various enhancements are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System base scores, wh ... oval:org.secpod.oval:def:501218 Wireshark is a network protocol analyzer. It is used to capture and browse the traffic running on a computer network. Multiple flaws were found in Wireshark. If Wireshark read a malformed packet off a network or opened a malicious dump file, it could crash or, possibly, execute arbitrary code as the ... oval:org.secpod.oval:def:40861 The host is installed Wireshark 1.8.x before 1.8.9 or 1.10.x before 1.10.1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly determine whether there is remaining packet data to process. Successful exploitation allows remote attackers to ... oval:org.secpod.oval:def:40862 The host is installed Wireshark 1.8.x before 1.8.9 or 1.10.x before 1.10.1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a crafted packet-trace file. Successful exploitation allows remote attackers to cause a denial of service ... oval:org.secpod.oval:def:40860 The host is installed Wireshark 1.8.x before 1.8.9 or 1.10.x before 1.10.1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly determine whether there is remaining packet data to process. Successful exploitation allows remote attackers to ... oval:org.secpod.oval:def:40863 The host is installed Wireshark 1.8.x before 1.8.9 or 1.10.x before 1.10.1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a crafted packet-trace file. Successful exploitation allows remote attackers to cause a denial of service ... oval:org.secpod.oval:def:16436 The host is installed with Wireshark 1.8.x before 1.8.12 or 1.10.x before 1.10.4 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to check for empty lines. Successful exploitation allows attackers to cause infinite loop via a crafted packet. oval:org.secpod.oval:def:40864 The host is installed Wireshark 1.8.x before 1.8.9 or 1.10.x before 1.10.1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly initialize a length field in certain abnormal situations. Successful exploitation allows remote attackers to cau ... oval:org.secpod.oval:def:15596 The host is installed with Wireshark 1.8.x before 1.8.10 or 1.10.x before 1.10.2 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly determine when to enter a certain loop. Successful exploitation allows attackers to cause application crash. oval:org.secpod.oval:def:1600294 Two flaws were found in Wireshark. If Wireshark read a malformed packet off a network or opened a malicious dump file, it could crash or, possibly, execute arbitrary code as the user running Wireshark. Several denial of service flaws were found in Wireshark. Wireshark could crash or stop responding ... oval:org.secpod.oval:def:15590 The host is installed with Wireshark Wireshark 1.8.x before 1.8.10 or 1.10.x before 1.10.2 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly determine when to enter a certain loop. Successful exploitation allows attackers to cause applicat ... oval:org.secpod.oval:def:1500433 Updated wireshark packages that fix multiple security issues are now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having Moderate security impact. Common Vulnerability Scoring System base scores, which give detailed severity ratings, are avai ... |