Wireshark

Wireshark

685 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.17%
  • Veröffentlicht 28.02.2016 04:59:07
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The iseries_check_file_type function in wiretap/iseries.c in the iSeries file parser in Wireshark 2.0.x before 2.0.2 does not consider that a line may lack the "OBJECT PROTOCOL" substring, which allows remote attackers to cause a denial of service (o...

  • EPSS 0.19%
  • Veröffentlicht 28.02.2016 04:59:06
  • Zuletzt bearbeitet 12.04.2025 10:46:40

wiretap/nettrace_3gpp_32_423.c in the 3GPP TS 32.423 Trace file parser in Wireshark 2.0.x before 2.0.2 does not ensure that a '\0' character is present at the end of certain strings, which allows remote attackers to cause a denial of service (stack-b...

  • EPSS 0.21%
  • Veröffentlicht 28.02.2016 04:59:06
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The dissect_nhdr_extopt function in epan/dissectors/packet-lbmc.c in the LBMC dissector in Wireshark 2.0.x before 2.0.2 does not validate length values, which allows remote attackers to cause a denial of service (stack-based buffer overflow and appli...

  • EPSS 0.22%
  • Veröffentlicht 28.02.2016 04:59:05
  • Zuletzt bearbeitet 12.04.2025 10:46:40

epan/dissectors/packet-hiqnet.c in the HiQnet dissector in Wireshark 2.0.x before 2.0.2 does not validate the data type, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet.

  • EPSS 0.29%
  • Veröffentlicht 28.02.2016 04:59:04
  • Zuletzt bearbeitet 12.04.2025 10:46:40

epan/dissectors/packet-http2.c in the HTTP/2 dissector in Wireshark 2.0.x before 2.0.2 does not limit the amount of header data, which allows remote attackers to cause a denial of service (memory consumption or application crash) via a crafted packet...

  • EPSS 0.22%
  • Veröffentlicht 28.02.2016 04:59:03
  • Zuletzt bearbeitet 12.04.2025 10:46:40

epan/dissectors/packet-x509af.c in the X.509AF dissector in Wireshark 2.0.x before 2.0.2 mishandles the algorithm ID, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.

  • EPSS 4.92%
  • Veröffentlicht 28.02.2016 04:59:02
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The dnp3_al_process_object function in epan/dissectors/packet-dnp.c in the DNP3 dissector in Wireshark 1.12.x before 1.12.10 and 2.0.x before 2.0.2 allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.

Exploit
  • EPSS 0.22%
  • Veröffentlicht 28.02.2016 04:59:01
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The dissect_ber_constrained_bitstring function in epan/dissectors/packet-ber.c in the ASN.1 BER dissector in Wireshark 2.0.x before 2.0.2 does not verify that a certain length is nonzero, which allows remote attackers to cause a denial of service (ou...

  • EPSS 0.03%
  • Veröffentlicht 28.02.2016 04:59:00
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Untrusted search path vulnerability in the WiresharkApplication class in ui/qt/wireshark_application.cpp in Wireshark 1.12.x before 1.12.10 and 2.0.x before 2.0.2 on Windows allows local users to gain privileges via a Trojan horse riched20.dll.dll fi...

  • EPSS 0.09%
  • Veröffentlicht 04.01.2016 05:59:32
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The dissect_CPMSetBindings function in epan/dissectors/packet-mswsp.c in the MS-WSP dissector in Wireshark 2.0.x before 2.0.1 does not validate the column size, which allows remote attackers to cause a denial of service (memory consumption or applica...