Wireshark

Wireshark

685 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.57%
  • Veröffentlicht 24.08.2015 23:59:01
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The wmem_block_split_free_chunk function in epan/wmem/wmem_allocator_block.c in the wmem block allocator in the memory manager in Wireshark 1.12.x before 1.12.7 does not properly consider a certain case of multiple realloc operations that restore a m...

  • EPSS 0.57%
  • Veröffentlicht 24.08.2015 23:59:00
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The proto_tree_add_bytes_item function in epan/proto.c in the protocol-tree implementation in Wireshark 1.12.x before 1.12.7 does not properly terminate a data structure after a failure to locate a number within a string, which allows remote attacker...

  • EPSS 0.42%
  • Veröffentlicht 22.07.2015 01:59:04
  • Zuletzt bearbeitet 12.04.2025 10:46:40

epan/dissectors/packet-gsm_a_dtap.c in the GSM DTAP dissector in Wireshark 1.12.x before 1.12.6 does not properly validate digit characters, which allows remote attackers to cause a denial of service (application crash) via a crafted packet, related ...

  • EPSS 0.43%
  • Veröffentlicht 22.07.2015 01:59:03
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The dissect_wccp2r1_address_table_info function in epan/dissectors/packet-wccp.c in the WCCP dissector in Wireshark 1.12.x before 1.12.6 does not properly determine whether enough memory is available for storing IP address strings, which allows remot...

  • EPSS 0.53%
  • Veröffentlicht 26.05.2015 15:59:12
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The logcat_dump_text function in wiretap/logcat.c in the Android Logcat file parser in Wireshark 1.12.x before 1.12.5 does not properly handle a lack of \0 termination, which allows remote attackers to cause a denial of service (out-of-bounds read an...

  • EPSS 0.55%
  • Veröffentlicht 26.05.2015 15:59:09
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The detect_version function in wiretap/logcat.c in the Android Logcat file parser in Wireshark 1.12.x before 1.12.5 does not check the length of the payload, which allows remote attackers to cause a denial of service (out-of-bounds read and applicati...

  • EPSS 0.19%
  • Veröffentlicht 26.05.2015 15:59:08
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The (1) dissect_tfs_request and (2) dissect_tfs_response functions in epan/dissectors/packet-ieee80211.c in the IEEE 802.11 dissector in Wireshark 1.10.x before 1.10.14 and 1.12.x before 1.12.5 interpret a zero value as a length rather than an error ...

  • EPSS 0.24%
  • Veröffentlicht 26.05.2015 15:59:07
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The fragment_add_work function in epan/reassemble.c in the packet-reassembly feature in Wireshark 1.12.x before 1.12.5 does not properly determine the defragmentation state in a case of an insufficient snapshot length, which allows remote attackers t...

  • EPSS 0.66%
  • Veröffentlicht 26.05.2015 15:59:06
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Multiple memory leaks in the x11_init_protocol function in epan/dissectors/packet-x11.c in the X11 dissector in Wireshark 1.10.x before 1.10.14 and 1.12.x before 1.12.5 allow remote attackers to cause a denial of service (memory consumption) via a cr...

  • EPSS 0.21%
  • Veröffentlicht 26.05.2015 15:59:05
  • Zuletzt bearbeitet 12.04.2025 10:46:40

epan/dissectors/packet-wcp.c in the WCP dissector in Wireshark 1.10.x before 1.10.14 and 1.12.x before 1.12.5 improperly refers to previously processed bytes, which allows remote attackers to cause a denial of service (application crash) via a crafte...