Wireshark

Wireshark

685 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 2.92%
  • Veröffentlicht 16.02.2009 20:30:03
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Wireshark 0.99.6 through 1.0.5 allows user-assisted remote attackers to cause a denial of service (application crash) via a crafted Tektronix K12 text capture file, as demonstrated by a file with exactly one frame.

  • EPSS 0.04%
  • Veröffentlicht 16.02.2009 20:30:03
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Format string vulnerability in Wireshark 0.99.8 through 1.0.5 on non-Windows platforms allows local users to cause a denial of service (application crash) via format string specifiers in the HOME environment variable.

Exploit
  • EPSS 2.01%
  • Veröffentlicht 16.02.2009 20:30:00
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Buffer overflow in wiretap/netscreen.c in Wireshark 0.99.7 through 1.0.5 allows user-assisted remote attackers to cause a denial of service (application crash) via a malformed NetScreen snoop file.

  • EPSS 2.42%
  • Veröffentlicht 01.12.2008 15:30:03
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Wireshark 1.0.4 and earlier allows remote attackers to cause a denial of service via a long SMTP request, which triggers an infinite loop.

Exploit
  • EPSS 3.84%
  • Veröffentlicht 22.10.2008 18:00:01
  • Zuletzt bearbeitet 09.04.2025 00:30:58

packet-usb.c in the USB dissector in Wireshark 0.99.7 through 1.0.3 allows remote attackers to cause a denial of service (application crash or abort) via a malformed USB Request Block (URB).

  • EPSS 1.05%
  • Veröffentlicht 22.10.2008 18:00:01
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Unspecified vulnerability in the Bluetooth RFCOMM dissector in Wireshark 0.99.7 through 1.0.3 allows remote attackers to cause a denial of service (application crash or abort) via unknown packets.

  • EPSS 5.61%
  • Veröffentlicht 22.10.2008 18:00:01
  • Zuletzt bearbeitet 09.04.2025 00:30:58

wtap.c in Wireshark 0.99.7 through 1.0.3 allows remote attackers to cause a denial of service (application abort) via a malformed Tamos CommView capture file (aka .ncf file) with an "unknown/unexpected packet type" that triggers a failed assertion.

Exploit
  • EPSS 3.33%
  • Veröffentlicht 22.10.2008 18:00:01
  • Zuletzt bearbeitet 09.04.2025 00:30:58

The dissect_btacl function in packet-bthci_acl.c in the Bluetooth ACL dissector in Wireshark 0.99.2 through 1.0.3 allows remote attackers to cause a denial of service (application crash or abort) via a packet with an invalid length, related to an err...

  • EPSS 1.05%
  • Veröffentlicht 22.10.2008 18:00:01
  • Zuletzt bearbeitet 09.04.2025 00:30:58

packet-frame in Wireshark 0.99.2 through 1.0.3 does not properly handle exceptions thrown by post dissectors, which allows remote attackers to cause a denial of service (application crash) via a certain series of packets, as demonstrated by enabling ...

  • EPSS 1.1%
  • Veröffentlicht 22.10.2008 18:00:01
  • Zuletzt bearbeitet 09.04.2025 00:30:58

Use-after-free vulnerability in the dissect_q931_cause_ie function in packet-q931.c in the Q.931 dissector in Wireshark 0.10.3 through 1.0.3 allows remote attackers to cause a denial of service (application crash or abort) via certain packets that tr...