Wireshark

Wireshark

689 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.43%
  • Veröffentlicht 23.02.2018 22:29:00
  • Zuletzt bearbeitet 21.11.2024 04:12:00

In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-thrift.c had a large loop that was addressed by not proceeding with dissection after encountering an unexpected type.

  • EPSS 0.54%
  • Veröffentlicht 23.02.2018 22:29:00
  • Zuletzt bearbeitet 21.11.2024 04:12:00

In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-dcm.c had an infinite loop that was addressed by checking for integer wraparound.

  • EPSS 0.54%
  • Veröffentlicht 23.02.2018 22:29:00
  • Zuletzt bearbeitet 21.11.2024 04:12:00

In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-wccp.c had a large loop that was addressed by ensuring that a calculated length was monotonically increasing.

  • EPSS 0.54%
  • Veröffentlicht 23.02.2018 22:29:00
  • Zuletzt bearbeitet 21.11.2024 04:12:01

In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-sccp.c had an infinite loop that was addressed by using a correct integer data type.

  • EPSS 0.38%
  • Veröffentlicht 23.02.2018 22:29:00
  • Zuletzt bearbeitet 21.11.2024 04:12:01

In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-rpki-rtr.c had an infinite loop that was addressed by validating a length field.

Exploit
  • EPSS 0.39%
  • Veröffentlicht 23.02.2018 22:29:00
  • Zuletzt bearbeitet 21.11.2024 04:12:01

In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-lltd.c had an infinite loop that was addressed by using a correct integer data type.

Exploit
  • EPSS 0.36%
  • Veröffentlicht 23.02.2018 22:29:00
  • Zuletzt bearbeitet 21.11.2024 04:12:01

In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-openflow_v6.c had an infinite loop that was addressed by validating property lengths.

  • EPSS 0.36%
  • Veröffentlicht 23.02.2018 22:29:00
  • Zuletzt bearbeitet 21.11.2024 04:12:01

In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-usb.c had an infinite loop that was addressed by rejecting short frame header lengths.

  • EPSS 0.36%
  • Veröffentlicht 23.02.2018 22:29:00
  • Zuletzt bearbeitet 21.11.2024 04:12:01

In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-s7comm.c had an infinite loop that was addressed by correcting off-by-one errors.

Exploit
  • EPSS 0.32%
  • Veröffentlicht 08.02.2018 07:29:01
  • Zuletzt bearbeitet 21.11.2024 04:11:16

The netmonrec_comment_destroy function in wiretap/netmon.c in Wireshark through 2.4.4 performs a free operation on an uninitialized memory address, which allows remote attackers to cause a denial of service (application crash) or possibly have unspec...