Download
| Alert*
oval:org.secpod.oval:def:24519
The host is installed with Wireshark 1.10.x before 1.10.14 or 1.12.x before 1.12.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which improperly refers to previously processed bytes. Successful exploitation allows remote attackers to cause a denial of serv ... oval:org.secpod.oval:def:24520 The host is installed with Wireshark 1.10.x before 1.10.14 or 1.12.x before 1.12.5 and is prone to multiple memory leak vulnerabilities. The flaws are present in the application, which fails to handle a crafted packet. Successful exploitation allows remote attackers to cause a denial of service (mem ... oval:org.secpod.oval:def:24525 The host is installed with Wireshark 1.10.x before 1.10.14 or 1.12.x before 1.12.5 and is prone to a denial of service vulnerability. A flaw is present in the application, which interprets a zero value as a length rather than an error condition. Successful exploitation allows remote attackers to cau ... oval:org.secpod.oval:def:17101 The host is installed with Wireshark 1.10.x before 1.10.1 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly validate MAC addresses. Successful exploitation allows attackers to cause a denial of service via a crafted packet. oval:org.secpod.oval:def:17099 The host is installed with Wireshark 1.8.x before 1.8.9 or 1.10.x before 1.10.1 and is prone to denial of service vulnerability. A flaw is present in the dissect_dvbci_tpdu_hdr function in epan/dissectors/packet-dvbci.c in the DVB-CI dissector in wireshark, which does not validate a certain length v ... oval:org.secpod.oval:def:17105 The host is installed with Wireshark 1.10.x before 1.10.1 and is prone to denial of service vulnerability. A flaw is present in the application, what does not properly validate certain index values. Successful exploitation allows attackers to cause a denial of service. oval:org.secpod.oval:def:17104 The host is installed with Wireshark 1.10.x before 1.10.1 and is prone to integer signedness error vulnerability. A flaw is present in the epan/dissectors/packet-dcom-sysact.c in the DCOM ISystemActivator dissector in wireshark, which fails to handle a crafted packet. Successful exploitation allows ... oval:org.secpod.oval:def:17103 The host is installed with Wireshark 1.10.x before 1.10.1 and is prone to denial of service vulnerability. A flaw is present in the epan/dissectors/packet-dcom-sysact.c in the DCOM ISystemActivator dissector in wireshark, which fails to properly determine whether there is remaining packet data to pr ... oval:org.secpod.oval:def:17102 The host is installed with Wireshark 1.10.x before 1.10.1 and is prone to integer signedness error vulnerability. A flaw is present in the dissect_headers function in epan/dissectors/packet-btobex.c in the Bluetooth OBEX dissector in Wireshark, which fails to handle a crafted packet. Successful expl ... oval:org.secpod.oval:def:17054 The host is installed with Wireshark 1.10.0 before 1.10.6 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a malformed packet trace file. Successful exploitation could allow attackers to make Wireshark crash by injecting a malfor ... oval:org.secpod.oval:def:17106 The host is installed with Wireshark 1.10.x before 1.10.1 and is prone to memory consumption vulnerability. A flaw is present in the dissect_dcom_ActivationProperties function in epan/dissectors/packet-dcom-sysact.c in the DCOM ISystemActivator dissector, which fails to handle a crafted packet. Succ ... oval:org.secpod.oval:def:17107 The host is installed with Wireshark 1.10.x before 1.10.1 and is prone to double free vulnerability. A flaw is present in the dissect_dcom_ActivationProperties function in epan/dissectors/packet-dcom-sysact.c in the DCOM ISystemActivator dissector, which fails to handle a crafted packet. Successful ... oval:org.secpod.oval:def:17108 The host is installed with Wireshark 1.10.x before 1.10.1 and is prone to denial of service vulnerability. A flaw is present in the dissect_radiotap function in epan/dissectors/packet-ieee80211-radiotap.c in the Radiotap dissector, which fails to handle a crafted packet. Successful exploitation allo ... oval:org.secpod.oval:def:17109 The host is installed with Wireshark 1.10.x before 1.10.1 and is prone to denial of service vulnerability. A flaw is present in the P1 dissector, which does not properly initialize a global variable. Successful exploitation allows attackers to cause a denial of service (crash). oval:org.secpod.oval:def:19984 The host is installed with Wireshark 1.10.x before 1.10.4 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted packet-trace file that includes a large packet. Successful exploitation allows attackers to execute arbitrary code or cause ... oval:org.secpod.oval:def:16431 The host is installed with Wireshark 1.10.x before 1.10.4 and is prone to denial of service vulnerability. A flaw is present in the application, which incorrectly relies on a global variable. Successful exploitation allows attackers to cause application crash via a crafted packet. oval:org.secpod.oval:def:16432 The host is installed with Wireshark 1.8.x before 1.8.12 or 1.10.x before 1.10.4 and is prone to multiple buffer overflow vulnerabilities. The flaws are present in the application, which fails to handle a long domain name in a packet. Successful exploitation allows attackers to cause application cra ... oval:org.secpod.oval:def:14852 The host is installed with Wireshark 1.8.x before 1.8.9 or 1.10.x before 1.10.1 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to terminate packet-data processing after finding zero remaining bytes. Successful exploitation allows attackers to cause ... oval:org.secpod.oval:def:14846 Wireshark 1.10.x (32 bit) is installed oval:org.secpod.oval:def:15597 The host is installed with Wireshark 1.8.x before 1.8.10 or 1.10.x before 1.10.2 and is prone to unspecified vulnerability. A flaw is present in the application, which fails to properly handle crafted packet. Successful exploitation allows attackers to cause application crash. oval:org.secpod.oval:def:16005 The host is installed with Wireshark 1.8.x before 1.8.11 or 1.10.x before 1.10.3 and is prone to denial of service vulnerability. The flaw is present in the epan/dissectors/packet-tcp.c in the TCP dissector, which does not properly determine the amount of remaining data. Successful exploitation allo ... oval:org.secpod.oval:def:15595 The host is installed with Wireshark 1.8.x before 1.8.10 or 1.10.x before 1.10.2 and is prone to buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle crafted packet. Successful exploitation allows attackers to cause application crash. oval:org.secpod.oval:def:16008 The host is installed with Wireshark 1.8.x before 1.8.11 or 1.10.x before 1.10.3 and is prone to unspecified vulnerability. The flaw is present in the in the NBAP dissector, which fails to handle a crafted packet. Successful exploitation allows remote attackers to cause a denial of service (applicat ... oval:org.secpod.oval:def:16009 The host is installed with Wireshark 1.8.x before 1.8.11 or 1.10.x before 1.10.3 and is prone to spoofing vulnerability. The flaw is present in the ieee802154_map_rec function in epan/dissectors/packet-ieee802154.c in the IEEE 802.15.4 dissecto, which fails to properly handle a crafted packet. Succe ... oval:org.secpod.oval:def:16006 The host is installed with Wireshark 1.8.x before 1.8.11 or 1.10.x before 1.10.3 and is prone to denial of service vulnerability. The flaw is present in the dissect_openwire_type function in epan/dissectors/packet-openwire.c in the OpenWire dissector, which fails to properly handle a crafted packet. ... oval:org.secpod.oval:def:16007 The host is installed with Wireshark 1.8.x before 1.8.11 or 1.10.x before 1.10.3 and is prone to denial of service vulnerability. The flaw is present in the dissect_sip_common function in epan/dissectors/packet-sip.c in the SIP dissector, which fails to properly initialize a data structure. Successf ... oval:org.secpod.oval:def:15593 The host is installed with Wireshark 1.8.x before 1.8.10 or 1.10.x before 1.10.2 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to restrict the dch_id value. Successful exploitation allows attackers to cause application crash. oval:org.secpod.oval:def:15594 The host is installed with Wireshark 1.8.x before 1.8.10 or 1.10.x before 1.10.2 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle crafted packet. Successful exploitation allows attackers to cause application crash. oval:org.secpod.oval:def:15592 The host is installed with Wireshark 1.10.x before 1.10.2 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly maintain a certain free list. Successful exploitation allows attackers to cause application crash. oval:org.secpod.oval:def:32528 The host is installed with Wireshark 1.10.12 through 1.10.14 and is prone to a denial of service vulnerability. A flaw is present in the application, which mishandles a certain strdup return value. Successful exploitation could allow attackers to cause a denial of service (application crash). oval:org.secpod.oval:def:17053 The host is installed with Wireshark 1.10.0 before 1.10.6 or 1.8.0 before 1.8.13 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a malformed packet trace file. Successful exploitation could allow attackers to make Wireshark cras ... oval:org.secpod.oval:def:21736 The host is installed with Wireshark 1.10.x before 1.10.11 or 1.12.x before 1.12.2 and is prone to a stack-based buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle a crafted packet. Successful exploitation allows remote attackers to cause a denial of ... oval:org.secpod.oval:def:21737 The host is installed with Wireshark 1.10.x before 1.10.11 or 1.12.x before 1.12.2 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a crafted packet. Successful exploitation allows remote attackers to cause a denial of service (a ... oval:org.secpod.oval:def:21735 The host is installed with Wireshark 1.10.x before 1.10.11 or 1.12.x before 1.12.2 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a crafted packet. Successful exploitation allows remote attackers to cause a denial of service (i ... oval:org.secpod.oval:def:21738 The host is installed with Wireshark 1.10.x before 1.10.11 or 1.12.x before 1.12.2 and is prone to multiple integer overflow vulnerabilities. A flaw is present in the application, which fails to properly handle a crafted packet. Successful exploitation allows remote attackers to cause a denial of se ... oval:org.secpod.oval:def:21739 The host is installed with Wireshark 1.10.x before 1.10.11 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted packet. Successful exploitation allows remote attackers to cause a denial of service (buffer over-read and application c ... oval:org.secpod.oval:def:20698 The host is installed with Wireshark 1.10.x before 1.10.9 and is prone to denial of service vulnerability. A flaw is present in the application, which does not properly validate padding values. Successful exploitation allows remote attackers to cause a denial of service (buffer underflow and applica ... oval:org.secpod.oval:def:20702 The host is installed with Wireshark 1.10.x before 1.10.9 and is prone to denial of service vulnerability. A flaw is present in the application, which does not properly strip '\n' characters. Successful exploitation allows remote attackers to cause a denial of service (buffer underflow and applicati ... oval:org.secpod.oval:def:20700 The host is installed with Wireshark 1.10.x before 1.10.9 and is prone to denial of service vulnerability. A flaw is present in the application, which does not completely initialize a certain buffer. Successful exploitation allows remote attackers to cause a denial of service (application crash). oval:org.secpod.oval:def:20701 The host is installed with Wireshark 1.10.x before 1.10.9 and is prone to denial of service vulnerability. A flaw is present in the application, which does not properly strip '\n' and '\r' characters. Successful exploitation allows remote attackers to cause a denial of service (off-by-one buffer und ... oval:org.secpod.oval:def:20699 The host is installed with Wireshark 1.10.x before 1.10.9 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted packet. Successful exploitation allows remote attackers to cause a denial of service (application crash). oval:org.secpod.oval:def:19985 The host is installed with Wireshark 1.10.x before 1.10.8 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted packet. Successful exploitation allows attackers to cause a denial of service (application crash). oval:org.secpod.oval:def:19895 The host is installed with Wireshark 1.10.x before 1.10.7 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a crafted packet. Successful exploitation could allow attackers to cause a denial of service (application crash). oval:org.secpod.oval:def:21204 The host is installed with Wireshark 1.10.x before 1.10.10 or 1.12.x before 1.12.1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a crafted file that triggers writes of uncompressed bytes beyond the end of the output buffer. Su ... oval:org.secpod.oval:def:21205 The host is installed with Wireshark 1.10.x before 1.10.10 or 1.12.x before 1.12.1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to prevent data overwrites during copy operations. Successful exploitation could allow attackers to crash the servic ... oval:org.secpod.oval:def:21202 The host is installed with Wireshark 1.10.x before 1.10.10 or 1.12.x before 1.12.1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle empty input data. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:14115 The host is installed with Wireshark 1.6.x before 1.6.16, 1.8.x before 1.8.8 or 1.10.0 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to validate a certain fragment length value. Successful exploitation allows attackers to cause an application cras ... oval:org.secpod.oval:def:21203 The host is installed with Wireshark 1.10.x before 1.10.10 or 1.12.x before 1.12.1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly validate bitmask data. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:17100 The host is installed with Wireshark 1.8.x before 1.8.9 or 1.10.x before 1.10.1 and is prone to integer signedness error vulnerability. A flaw is present in the get_type_length function in epan/dissectors/packet-btsdp.c in the Bluetooth SDP dissector in Wireshark, which fails to properly handle a cr ... oval:org.secpod.oval:def:21200 The host is installed with Wireshark 1.10.x before 1.10.10 or 1.12.x before 1.12.1 and is prone to an off-by-one error vulnerability. A flaw is present in the application, which fails to properly handle a crafted packet that triggers parsing of a token located one position beyond the current positio ... oval:org.secpod.oval:def:21201 The host is installed with Wireshark 1.10.x before 1.10.10 or 1.12.x before 1.12.1 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly initialize a certain ID value. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:16433 The host is installed with Wireshark 1.8.x before 1.8.12 or 1.10.x before 1.10.4 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to check for empty lines. Successful exploitation allows attackers to cause infinite loop via a crafted packet. oval:org.secpod.oval:def:14850 The host is installed with Wireshark 1.8.x before 1.8.9 or 1.10.x before 1.10.1 and is prone to multiple array index error vulnerabilities. The flaws are present in the application, which fails to handle a crafted packet. Successful exploitation allows attackers to cause an application crash. oval:org.secpod.oval:def:14851 The host is installed with Wireshark 1.8.x before 1.8.9 or 1.10.x before 1.10.1 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly handle a crafted packet. Successful exploitation allows attackers to cause an application crash. oval:org.secpod.oval:def:14847 The host is installed with Wireshark 1.8.x before 1.8.9 or 1.10.x before 1.10.1 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to initialize a length field in certain abnormal situations. Successful exploitation allows attackers to cause an applica ... oval:org.secpod.oval:def:21196 The host is installed with Wireshark 1.10.x before 1.10.10 or 1.12.x before 1.12.1 and is prone to a denial of service vulnerability. A flaw is present in the MEGACO dissector in Wireshark, which fails to handle an empty line. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:21197 The host is installed with Wireshark 1.10.x before 1.10.10 or 1.12.x before 1.12.1 and is prone to a denial of service vulnerability. A flaw is present in the application, which refers to incorrect offset and start variables. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:14848 The host is installed with Wireshark 1.8.x before 1.8.9 or 1.10.x before 1.10.1 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to initialize certain structure members. Successful exploitation allows attackers to cause an application crash. oval:org.secpod.oval:def:21194 The host is installed with Wireshark 1.10.x before 1.10.10 and is prone to an use-after-free vulnerability. A flaw is present in the application, which fails to handle a crafted packet. Successful exploitation could allow attackers to split memory ownership between the SDP and RTP dissectors. oval:org.secpod.oval:def:14849 The host is installed with Wireshark 1.8.x before 1.8.9 or 1.10.x before 1.10.1 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly allocate memory. Successful exploitation allows attackers to cause an application crash. oval:org.secpod.oval:def:21195 The host is installed with Wireshark 1.10.x before 1.10.10 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to handle a crafted packet to the RTP dissector. Successful exploitation could allow attackers to crash the service. oval:org.secpod.oval:def:15596 The host is installed with Wireshark 1.8.x before 1.8.10 or 1.10.x before 1.10.2 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to properly determine when to enter a certain loop. Successful exploitation allows attackers to cause application crash. oval:org.secpod.oval:def:17052 The host is installed with Wireshark 1.10.0 before 1.10.6 or 1.8.0 before 1.8.13 and is prone to a buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle a malformed packet trace file. Successful exploitation could allow attackers to execute malicious cod ... oval:org.secpod.oval:def:17055 The host is installed with Wireshark 1.10.0 before 1.10.6 or 1.8.0 before 1.8.13 and is prone to a denial of service vulnerability. A flaw is present in the application, which fails to properly handle a malformed packet trace file. Successful exploitation could allow attackers to make Wireshark cras ... |