Refine your search

99 vulnerabilities found for Wireshark by Wireshark

CERTFR-2025-AVI-0857
Vulnerability from certfr_avis

Une vulnérabilité a été découverte dans Wireshark. Elle permet à un attaquant de provoquer un déni de service à distance.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Wireshark Wireshark Wireshark versions 4.2.x antérieures à 4.2.14
Wireshark Wireshark Wireshark versions 4.4.x antérieures à 4.4.10
References

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Wireshark versions 4.2.x ant\u00e9rieures \u00e0 4.2.14",
      "product": {
        "name": "Wireshark",
        "vendor": {
          "name": "Wireshark",
          "scada": false
        }
      }
    },
    {
      "description": "Wireshark versions 4.4.x ant\u00e9rieures \u00e0 4.4.10",
      "product": {
        "name": "Wireshark",
        "vendor": {
          "name": "Wireshark",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [],
  "initial_release_date": "2025-10-09T00:00:00",
  "last_revision_date": "2025-10-09T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0857",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-10-09T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans Wireshark. Elle permet \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance.",
  "title": "Vuln\u00e9rabilit\u00e9 dans Wireshark",
  "vendor_advisories": [
    {
      "published_at": "2025-10-09",
      "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2025-04",
      "url": "https://www.wireshark.org/security/wnpa-sec-2025-04.html"
    }
  ]
}

CERTFR-2025-AVI-0741
Vulnerability from certfr_avis

Une vulnérabilité a été découverte dans Wireshark. Elle permet à un attaquant de provoquer un déni de service à distance.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Wireshark Wireshark Wireshark versions 4.4.x antérieures à 4.4.9
References

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Wireshark versions 4.4.x ant\u00e9rieures \u00e0 4.4.9",
      "product": {
        "name": "Wireshark",
        "vendor": {
          "name": "Wireshark",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [],
  "initial_release_date": "2025-08-29T00:00:00",
  "last_revision_date": "2025-08-29T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0741",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-08-29T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans Wireshark. Elle permet \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance.",
  "title": "Vuln\u00e9rabilit\u00e9 dans Wireshark",
  "vendor_advisories": [
    {
      "published_at": "2025-08-29",
      "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2025-03",
      "url": "https://www.wireshark.org/security/wnpa-sec-2025-03.html"
    }
  ]
}

CERTFR-2025-AVI-0478
Vulnerability from certfr_avis

Une vulnérabilité a été découverte dans Wireshark. Elle permet à un attaquant de provoquer un déni de service à distance.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Wireshark Wireshark Wireshark versions 4.4.x antérieures à 4.4.7
Wireshark Wireshark Wireshark versions 4.2.x antérieures à 4.2.12
References

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Wireshark versions 4.4.x ant\u00e9rieures \u00e0 4.4.7",
      "product": {
        "name": "Wireshark",
        "vendor": {
          "name": "Wireshark",
          "scada": false
        }
      }
    },
    {
      "description": "Wireshark versions 4.2.x ant\u00e9rieures \u00e0 4.2.12",
      "product": {
        "name": "Wireshark",
        "vendor": {
          "name": "Wireshark",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2025-5601",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5601"
    }
  ],
  "initial_release_date": "2025-06-05T00:00:00",
  "last_revision_date": "2025-06-05T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0478",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-06-05T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans Wireshark. Elle permet \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance.",
  "title": "Vuln\u00e9rabilit\u00e9 dans Wireshark",
  "vendor_advisories": [
    {
      "published_at": "2025-06-05",
      "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2025-02",
      "url": "https://www.wireshark.org/security/wnpa-sec-2025-02.html"
    }
  ]
}

CERTFR-2025-AVI-0145
Vulnerability from certfr_avis

Une vulnérabilité a été découverte dans Wireshark. Elle permet à un attaquant de provoquer un déni de service à distance.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Wireshark Wireshark Wireshark versions 4.2.x antérieures à 4.2.11
Wireshark Wireshark Wireshark versions 4.4.x antérieures à 4.4.4
References

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Wireshark versions 4.2.x ant\u00e9rieures \u00e0 4.2.11",
      "product": {
        "name": "Wireshark",
        "vendor": {
          "name": "Wireshark",
          "scada": false
        }
      }
    },
    {
      "description": "Wireshark versions 4.4.x ant\u00e9rieures \u00e0 4.4.4",
      "product": {
        "name": "Wireshark",
        "vendor": {
          "name": "Wireshark",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2025-1492",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1492"
    }
  ],
  "initial_release_date": "2025-02-20T00:00:00",
  "last_revision_date": "2025-02-20T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0145",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-02-20T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans Wireshark. Elle permet \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance.",
  "title": "Vuln\u00e9rabilit\u00e9 dans Wireshark",
  "vendor_advisories": [
    {
      "published_at": "2025-04-09",
      "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2025-01",
      "url": "https://www.wireshark.org/security/wnpa-sec-2025-01.html"
    }
  ]
}

CERTFR-2024-AVI-1008
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans Wireshark. Elles permettent à un attaquant de provoquer un déni de service à distance.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Wireshark Wireshark Wireshark versions 4.4.x antérieures à 4.4.2
Wireshark Wireshark Wireshark versions 4.2.x antérieures à 4.2.9
References

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Wireshark versions 4.4.x ant\u00e9rieures \u00e0 4.4.2",
      "product": {
        "name": "Wireshark",
        "vendor": {
          "name": "Wireshark",
          "scada": false
        }
      }
    },
    {
      "description": "Wireshark versions 4.2.x ant\u00e9rieures \u00e0 4.2.9",
      "product": {
        "name": "Wireshark",
        "vendor": {
          "name": "Wireshark",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [],
  "initial_release_date": "2024-11-21T00:00:00",
  "last_revision_date": "2024-11-21T00:00:00",
  "links": [],
  "reference": "CERTFR-2024-AVI-1008",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-11-21T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Wireshark. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans Wireshark",
  "vendor_advisories": [
    {
      "published_at": "2024-11-21",
      "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2024-14",
      "url": "https://www.wireshark.org/security/wnpa-sec-2024-14.html"
    },
    {
      "published_at": "2024-11-21",
      "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2024-15",
      "url": "https://www.wireshark.org/security/wnpa-sec-2024-15.html"
    }
  ]
}

CERTFR-2024-AVI-0861
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans Wireshark. Elles permettent à un attaquant de provoquer un déni de service à distance.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Wireshark Wireshark Wireshark versions 4.2.x antérieures à 4.2.8
Wireshark Wireshark Wireshark versions 4.0.x antérieures à 4.0.1
References

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Wireshark versions 4.2.x ant\u00e9rieures \u00e0 4.2.8",
      "product": {
        "name": "Wireshark",
        "vendor": {
          "name": "Wireshark",
          "scada": false
        }
      }
    },
    {
      "description": "Wireshark versions 4.0.x ant\u00e9rieures \u00e0 4.0.1",
      "product": {
        "name": "Wireshark",
        "vendor": {
          "name": "Wireshark",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [],
  "initial_release_date": "2024-10-10T00:00:00",
  "last_revision_date": "2024-10-10T00:00:00",
  "links": [],
  "reference": "CERTFR-2024-AVI-0861",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-10-10T00:00:00.000000"
    },
    {
      "description": "Correction de l\u0027\u00e9diteur, les versions 4.4.x sont affect\u00e9es, et non les versions 4.0.x",
      "revision_date": "2024-10-10T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Wireshark. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans Wireshark",
  "vendor_advisories": [
    {
      "published_at": "2024-10-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2024-13",
      "url": "https://www.wireshark.org/security/wnpa-sec-2024-13.html"
    },
    {
      "published_at": "2024-10-10",
      "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2024-12",
      "url": "https://www.wireshark.org/security/wnpa-sec-2024-12.html"
    }
  ]
}

CERTFR-2024-AVI-0568
Vulnerability from certfr_avis

Une vulnérabilité a été découverte dans Wireshark. Elle permet à un attaquant de provoquer un déni de service à distance.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
Wireshark Wireshark Wireshark versions 4.0.x antérieures à 4.0.16
Wireshark Wireshark Wireshark versions 4.2.x antérieures à 4.2.6
References

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Wireshark versions 4.0.x ant\u00e9rieures \u00e0 4.0.16",
      "product": {
        "name": "Wireshark",
        "vendor": {
          "name": "Wireshark",
          "scada": false
        }
      }
    },
    {
      "description": "Wireshark versions 4.2.x ant\u00e9rieures \u00e0 4.2.6",
      "product": {
        "name": "Wireshark",
        "vendor": {
          "name": "Wireshark",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [],
  "initial_release_date": "2024-07-11T00:00:00",
  "last_revision_date": "2024-07-11T00:00:00",
  "links": [],
  "reference": "CERTFR-2024-AVI-0568",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-07-11T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans Wireshark. Elle permet \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance.",
  "title": "Vuln\u00e9rabilit\u00e9 dans Wireshark",
  "vendor_advisories": [
    {
      "published_at": "2024-07-11",
      "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2024-10",
      "url": "https://www.wireshark.org/security/wnpa-sec-2024-10.html"
    }
  ]
}

CERTFR-2024-AVI-0411
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits Wireshark. Elles permettent à un attaquant de provoquer un déni de service.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Wireshark Wireshark Wireshark versions 3.6.x antérieures à 3.6.23
Wireshark Wireshark Wireshark versions 4.2.x antérieures à 4.2.5
Wireshark Wireshark Wireshark versions 4.0.x antérieures à 4.0.15

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Wireshark versions 3.6.x ant\u00e9rieures \u00e0 3.6.23",
      "product": {
        "name": "Wireshark",
        "vendor": {
          "name": "Wireshark",
          "scada": false
        }
      }
    },
    {
      "description": "Wireshark versions 4.2.x ant\u00e9rieures \u00e0 4.2.5",
      "product": {
        "name": "Wireshark",
        "vendor": {
          "name": "Wireshark",
          "scada": false
        }
      }
    },
    {
      "description": "Wireshark versions 4.0.x ant\u00e9rieures \u00e0 4.0.15",
      "product": {
        "name": "Wireshark",
        "vendor": {
          "name": "Wireshark",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2024-4855",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-4855"
    },
    {
      "name": "CVE-2024-4853",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-4853"
    },
    {
      "name": "CVE-2024-4854",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-4854"
    }
  ],
  "initial_release_date": "2024-05-16T00:00:00",
  "last_revision_date": "2024-05-16T00:00:00",
  "links": [],
  "reference": "CERTFR-2024-AVI-0411",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-05-16T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits Wireshark\u003c/span\u003e. Elles permettent \u00e0 un\nattaquant de provoquer un d\u00e9ni de service.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans Wireshark",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2024-09 du 16 mai 2024",
      "url": "https://www.wireshark.org/security/wnpa-sec-2024-09.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2024-08 du 16 mai 2024",
      "url": "https://www.wireshark.org/security/wnpa-sec-2024-08.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2024-07 du 16 mai 2024",
      "url": "https://www.wireshark.org/security/wnpa-sec-2024-07.html"
    }
  ]
}

CERTFR-2024-AVI-0256
Vulnerability from certfr_avis

Une vulnérabilité a été découverte dans Wireshark. Elle permet à un attaquant de provoquer un déni de service à distance.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Wireshark Wireshark Wireshark versions 4.0.x antérieures à 4.0.14
Wireshark Wireshark Wireshark versions 4.2.x antérieures à 4.2.4
References

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Wireshark versions 4.0.x ant\u00e9rieures \u00e0 4.0.14",
      "product": {
        "name": "Wireshark",
        "vendor": {
          "name": "Wireshark",
          "scada": false
        }
      }
    },
    {
      "description": "Wireshark versions 4.2.x ant\u00e9rieures \u00e0 4.2.4",
      "product": {
        "name": "Wireshark",
        "vendor": {
          "name": "Wireshark",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2024-2955",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-2955"
    }
  ],
  "initial_release_date": "2024-03-28T00:00:00",
  "last_revision_date": "2024-03-28T00:00:00",
  "links": [],
  "reference": "CERTFR-2024-AVI-0256",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-03-28T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans Wireshark. Elle permet \u00e0 un\nattaquant de provoquer un d\u00e9ni de service \u00e0 distance.\n",
  "title": "Vuln\u00e9rabilit\u00e9 dans Wireshark",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2024-06 du 27 mars 2024",
      "url": "https://www.wireshark.org/security/wnpa-sec-2024-06.html"
    }
  ]
}

CERTFR-2024-AVI-0007
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits Wireshark. Elles permettent à un attaquant de provoquer un déni de service à distance.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Wireshark Wireshark Wireshark versions 4.0.x antérieures à 4.0.12
Wireshark Wireshark Wireshark versions 3.6.x antérieures à 3.6.20
Wireshark Wireshark Wireshark versions 4.2.x antérieures à 4.2.1

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Wireshark versions 4.0.x ant\u00e9rieures \u00e0 4.0.12",
      "product": {
        "name": "Wireshark",
        "vendor": {
          "name": "Wireshark",
          "scada": false
        }
      }
    },
    {
      "description": "Wireshark versions 3.6.x ant\u00e9rieures \u00e0 3.6.20",
      "product": {
        "name": "Wireshark",
        "vendor": {
          "name": "Wireshark",
          "scada": false
        }
      }
    },
    {
      "description": "Wireshark versions 4.2.x ant\u00e9rieures \u00e0 4.2.1",
      "product": {
        "name": "Wireshark",
        "vendor": {
          "name": "Wireshark",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2024-0209",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-0209"
    },
    {
      "name": "CVE-2024-0208",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-0208"
    },
    {
      "name": "CVE-2024-0207",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-0207"
    },
    {
      "name": "CVE-2024-0210",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-0210"
    }
  ],
  "initial_release_date": "2024-01-05T00:00:00",
  "last_revision_date": "2024-01-05T00:00:00",
  "links": [
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2024-03 du 04 janvier 2024",
      "url": "https://www.wireshark.org/security/wnpa-sec-2024-03.html"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2024-01 du 04 janvier 2024",
      "url": "https://www.wireshark.org/security/wnpa-sec-2024-01.html"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2024-02 du 04 janvier 2024",
      "url": "https://www.wireshark.org/security/wnpa-sec-2024-02.html"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2024-04 du 04 janvier 2024",
      "url": "https://www.wireshark.org/security/wnpa-sec-2024-04.html"
    }
  ],
  "reference": "CERTFR-2024-AVI-0007",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-01-05T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits Wireshark\u003c/span\u003e. Elles permettent \u00e0 un\nattaquant de provoquer un d\u00e9ni de service \u00e0 distance.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans Wireshark",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2024-02 du 03 janvier 2024",
      "url": null
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2024-04 du 03 janvier 2024",
      "url": null
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2024-01 du 03 janvier 2024",
      "url": null
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2024-03 du 03 janvier 2024",
      "url": null
    }
  ]
}

CERTFR-2024-AVI-0005
Vulnerability from certfr_avis

Une vulnérabilité a été découverte dans Wireshark. Elle permet à un attaquant de provoquer un déni de service à distance.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Wireshark Wireshark Wireshark versions antérieures à 4.2.1
References

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Wireshark versions ant\u00e9rieures \u00e0 4.2.1",
      "product": {
        "name": "Wireshark",
        "vendor": {
          "name": "Wireshark",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2024-0211",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-0211"
    }
  ],
  "initial_release_date": "2024-01-04T00:00:00",
  "last_revision_date": "2024-01-04T00:00:00",
  "links": [],
  "reference": "CERTFR-2024-AVI-0005",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-01-04T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans \u003cspan\nclass=\"textit\"\u003eWireshark\u003c/span\u003e. Elle permet \u00e0 un attaquant de provoquer\nun d\u00e9ni de service \u00e0 distance.\n",
  "title": "Vuln\u00e9rabilit\u00e9 dans Wireshark",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2024-05 du 03 janvier 2024",
      "url": "https://www.wireshark.org/security/wnpa-sec-2024-05.html"
    }
  ]
}

CERTFR-2023-AVI-0949
Vulnerability from certfr_avis

Une vulnérabilité a été découverte dans Wireshark NetScreen file parser. Elle permet à un attaquant de provoquer un déni de service à distance.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Wireshark Wireshark Wireshark NetScreen file parser versions 3.6.x antérieures à 3.6.19
Wireshark Wireshark Wireshark NetScreen file parser versions 4.0.x antérieures à 4.0.11
References

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Wireshark NetScreen file parser versions 3.6.x ant\u00e9rieures \u00e0 3.6.19",
      "product": {
        "name": "Wireshark",
        "vendor": {
          "name": "Wireshark",
          "scada": false
        }
      }
    },
    {
      "description": "Wireshark NetScreen file parser versions 4.0.x ant\u00e9rieures \u00e0 4.0.11",
      "product": {
        "name": "Wireshark",
        "vendor": {
          "name": "Wireshark",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2023-6175",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6175"
    }
  ],
  "initial_release_date": "2023-11-16T00:00:00",
  "last_revision_date": "2023-11-16T00:00:00",
  "links": [],
  "reference": "CERTFR-2023-AVI-0949",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2023-11-16T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans \u003cspan class=\"textit\"\u003eWireshark\nNetScreen file parser\u003c/span\u003e. Elle permet \u00e0 un attaquant de provoquer un\nd\u00e9ni de service \u00e0 distance.\n",
  "title": "Vuln\u00e9rabilit\u00e9 dans Wireshark NetScreen file parser",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2023-29 du 16 novembre 2023",
      "url": "https://www.wireshark.org/security/wnpa-sec-2023-29.html"
    }
  ]
}

CERTFR-2023-AVI-0808
Vulnerability from certfr_avis

Une vulnérabilité a été découverte dans Wireshark. Elle permet à un attaquant de provoquer un déni de service à distance.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Wireshark Wireshark Wireshark versions 4.x antérieures à 4.0.9
Wireshark Wireshark Wireshark versions 3.x antérieures à 3.6.17
References

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Wireshark versions 4.x ant\u00e9rieures \u00e0 4.0.9",
      "product": {
        "name": "Wireshark",
        "vendor": {
          "name": "Wireshark",
          "scada": false
        }
      }
    },
    {
      "description": "Wireshark versions 3.x ant\u00e9rieures \u00e0 3.6.17",
      "product": {
        "name": "Wireshark",
        "vendor": {
          "name": "Wireshark",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2023-5371",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-5371"
    }
  ],
  "initial_release_date": "2023-10-05T00:00:00",
  "last_revision_date": "2023-10-05T00:00:00",
  "links": [],
  "reference": "CERTFR-2023-AVI-0808",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2023-10-05T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans \u003cspan\nclass=\"textit\"\u003eWireshark\u003c/span\u003e. Elle permet \u00e0 un attaquant de provoquer\nun d\u00e9ni de service \u00e0 distance.\n",
  "title": "Vuln\u00e9rabilit\u00e9 dans Wireshark",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2023-27 du 05 octobre 2023",
      "url": "https://www.wireshark.org/security/wnpa-sec-2023-27.html"
    }
  ]
}

CERTFR-2023-AVI-0678
Vulnerability from certfr_avis

Une vulnérabilité a été découverte dans Wireshark. Elle permet à un attaquant de provoquer un déni de service à distance.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Wireshark Wireshark Wireshark versions 4.0.x antérieures à 4.0.8
Wireshark Wireshark Wireshark versions 3.6.x antérieures à 3.6.16
References

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Wireshark versions 4.0.x ant\u00e9rieures \u00e0 4.0.8",
      "product": {
        "name": "Wireshark",
        "vendor": {
          "name": "Wireshark",
          "scada": false
        }
      }
    },
    {
      "description": "Wireshark versions 3.6.x ant\u00e9rieures \u00e0 3.6.16",
      "product": {
        "name": "Wireshark",
        "vendor": {
          "name": "Wireshark",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [],
  "initial_release_date": "2023-08-24T00:00:00",
  "last_revision_date": "2023-08-24T00:00:00",
  "links": [],
  "reference": "CERTFR-2023-AVI-0678",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2023-08-24T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans Wireshark. Elle permet \u00e0 un\nattaquant de provoquer un d\u00e9ni de service \u00e0 distance.\n",
  "title": "Vuln\u00e9rabilit\u00e9 dans Wireshark",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2023-26 du 23 ao\u00fbt 2023",
      "url": "https://www.wireshark.org/security/wnpa-sec-2023-26.html"
    }
  ]
}

CERTFR-2023-AVI-0539
Vulnerability from certfr_avis

Une vulnérabilité a été découverte dans Wireshark. Elle permet à un attaquant de provoquer un déni de service à distance.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Wireshark Wireshark Wireshark versions 4.0.x antérieures à 4.0.7
References

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Wireshark versions 4.0.x ant\u00e9rieures \u00e0 4.0.7",
      "product": {
        "name": "Wireshark",
        "vendor": {
          "name": "Wireshark",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [],
  "initial_release_date": "2023-07-13T00:00:00",
  "last_revision_date": "2023-07-13T00:00:00",
  "links": [],
  "reference": "CERTFR-2023-AVI-0539",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2023-07-13T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans \u003cspan\nclass=\"textit\"\u003eWireshark\u003c/span\u003e. Elle permet \u00e0 un attaquant de provoquer\nun d\u00e9ni de service \u00e0 distance.\n",
  "title": "Vuln\u00e9rabilit\u00e9 dans Wireshark",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2023-22 du 13 juillet 2023",
      "url": "https://www.wireshark.org/security/wnpa-sec-2023-22.html"
    }
  ]
}

CERTFR-2023-AVI-0409
Vulnerability from certfr_avis

Une vulnérabilité a été découverte dans Wireshark. Elle permet à un attaquant de provoquer un déni de service.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Wireshark Wireshark Wireshark versions 4.0.x antérieures à 4.0.6
Wireshark Wireshark Wireshark versions 3.6.x antérieures à 3.6.14
References

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Wireshark versions 4.0.x ant\u00e9rieures \u00e0 4.0.6",
      "product": {
        "name": "Wireshark",
        "vendor": {
          "name": "Wireshark",
          "scada": false
        }
      }
    },
    {
      "description": "Wireshark versions 3.6.x ant\u00e9rieures \u00e0 3.6.14",
      "product": {
        "name": "Wireshark",
        "vendor": {
          "name": "Wireshark",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [],
  "initial_release_date": "2023-05-25T00:00:00",
  "last_revision_date": "2023-05-25T00:00:00",
  "links": [],
  "reference": "CERTFR-2023-AVI-0409",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2023-05-25T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans \u003cspan\nclass=\"textit\"\u003eWireshark\u003c/span\u003e. Elle permet \u00e0 un attaquant de provoquer\nun d\u00e9ni de service.\n",
  "title": "Vuln\u00e9rabilit\u00e9 dans Wireshark",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2023-20 du 24 mai 2023",
      "url": "https://www.wireshark.org/security/wnpa-sec-2023-20.html"
    }
  ]
}

CERTFR-2023-AVI-0312
Vulnerability from certfr_avis

Une vulnérabilité a été découverte dans Wireshark. Elle permet à un attaquant de provoquer un déni de service à distance.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Wireshark Wireshark Wireshark versions 4.0.x antérieures à 4.0.5
Wireshark Wireshark Wireshark versions 3.6.x antérieures à 3.6.13
References

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Wireshark versions 4.0.x ant\u00e9rieures \u00e0 4.0.5",
      "product": {
        "name": "Wireshark",
        "vendor": {
          "name": "Wireshark",
          "scada": false
        }
      }
    },
    {
      "description": "Wireshark versions 3.6.x ant\u00e9rieures \u00e0 3.6.13",
      "product": {
        "name": "Wireshark",
        "vendor": {
          "name": "Wireshark",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2023-1994",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-1994"
    }
  ],
  "initial_release_date": "2023-04-13T00:00:00",
  "last_revision_date": "2023-04-13T00:00:00",
  "links": [],
  "reference": "CERTFR-2023-AVI-0312",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2023-04-13T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans Wireshark. Elle permet \u00e0 un\nattaquant de provoquer un d\u00e9ni de service \u00e0 distance.\n",
  "title": "Vuln\u00e9rabilit\u00e9 dans Wireshark",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2023-11 du 12 avril 2023",
      "url": "https://www.wireshark.org/security/wnpa-sec-2023-11.html"
    }
  ]
}

CERTFR-2023-AVI-0191
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans Wireshark. Elles permettent à un attaquant de provoquer un déni de service à distance.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Wireshark Wireshark Wireshark versions 4.0.x antérieures à 4.0.4
Wireshark Wireshark Wireshark versions 3.6.x antérieures à 3.6.12
References

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Wireshark versions 4.0.x ant\u00e9rieures \u00e0 4.0.4",
      "product": {
        "name": "Wireshark",
        "vendor": {
          "name": "Wireshark",
          "scada": false
        }
      }
    },
    {
      "description": "Wireshark versions 3.6.x ant\u00e9rieures \u00e0 3.6.12",
      "product": {
        "name": "Wireshark",
        "vendor": {
          "name": "Wireshark",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2023-1161",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-1161"
    }
  ],
  "initial_release_date": "2023-03-03T00:00:00",
  "last_revision_date": "2023-03-07T00:00:00",
  "links": [],
  "reference": "CERTFR-2023-AVI-0191",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2023-03-03T00:00:00.000000"
    },
    {
      "description": "Correction erreur sur les versions 3.6.x",
      "revision_date": "2023-03-06T00:00:00.000000"
    },
    {
      "description": "Ajout du num\u00e9ro de CVE",
      "revision_date": "2023-03-07T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Wireshark. Elles\npermettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans Wireshark",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2023-08 du 02 mars 2023",
      "url": "https://www.wireshark.org/security/wnpa-sec-2023-08.html"
    }
  ]
}

CERTFR-2023-AVI-0042
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans Wireshark. Elles permettent à un attaquant de provoquer un déni de service à distance et une atteinte à la confidentialité des données.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Wireshark Wireshark Wireshark versions 4.0.x antérieures à 4.0.3
Wireshark Wireshark Wireshark versions 3.6.x antérieures à 3.6.11

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Wireshark versions 4.0.x ant\u00e9rieures \u00e0 4.0.3",
      "product": {
        "name": "Wireshark",
        "vendor": {
          "name": "Wireshark",
          "scada": false
        }
      }
    },
    {
      "description": "Wireshark versions 3.6.x ant\u00e9rieures \u00e0 3.6.11",
      "product": {
        "name": "Wireshark",
        "vendor": {
          "name": "Wireshark",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [],
  "initial_release_date": "2023-01-19T00:00:00",
  "last_revision_date": "2023-01-19T00:00:00",
  "links": [],
  "reference": "CERTFR-2023-AVI-0042",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2023-01-19T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Wireshark. Elles\npermettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance et\nune atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans Wireshark",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2023-03 du 18 janvier 2023",
      "url": "https://www.wireshark.org/security/wnpa-sec-2023-03.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2023-07 du 18 janvier 2023",
      "url": "https://www.wireshark.org/security/wnpa-sec-2023-07.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2023-05 du 18 janvier 2023",
      "url": "https://www.wireshark.org/security/wnpa-sec-2023-05.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2023-02 du 18 janvier 2023",
      "url": "https://www.wireshark.org/security/wnpa-sec-2023-02.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2023-04 du 18 janvier 2023",
      "url": "https://www.wireshark.org/security/wnpa-sec-2023-04.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2023-06 du 18 janvier 2023",
      "url": "https://www.wireshark.org/security/wnpa-sec-2023-06.html"
    }
  ]
}

CERTFR-2022-AVI-1082
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans Wireshark. Elles permettent à un attaquant de provoquer un déni de service à distance.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Wireshark Wireshark Wireshark versions 3.6.x antérieures à 3.6.10
Wireshark Wireshark Wireshark versions 4.0.x antérieures à 4.0.2

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Wireshark versions 3.6.x ant\u00e9rieures \u00e0 3.6.10",
      "product": {
        "name": "Wireshark",
        "vendor": {
          "name": "Wireshark",
          "scada": false
        }
      }
    },
    {
      "description": "Wireshark versions 4.0.x ant\u00e9rieures \u00e0 4.0.2",
      "product": {
        "name": "Wireshark",
        "vendor": {
          "name": "Wireshark",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [],
  "initial_release_date": "2022-12-08T00:00:00",
  "last_revision_date": "2022-12-08T00:00:00",
  "links": [],
  "reference": "CERTFR-2022-AVI-1082",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2022-12-08T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Wireshark. Elles\npermettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans Wireshark",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2022-09 du 07 d\u00e9cembre 2022",
      "url": "https://www.wireshark.org/security/wnpa-sec-2022-09.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2022-10 du 07 d\u00e9cembre 2022",
      "url": "https://www.wireshark.org/security/wnpa-sec-2022-10.html"
    }
  ]
}

CERTFR-2022-AVI-958
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans Wireshark. Elles permettent à un attaquant de provoquer un déni de service à distance.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Wireshark Wireshark Wireshark versions 3.6.x antérieures à 3.6.9

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Wireshark versions 3.6.x ant\u00e9rieures \u00e0 3.6.9",
      "product": {
        "name": "Wireshark",
        "vendor": {
          "name": "Wireshark",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [],
  "initial_release_date": "2022-10-27T00:00:00",
  "last_revision_date": "2022-10-27T00:00:00",
  "links": [],
  "reference": "CERTFR-2022-AVI-958",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2022-10-27T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Wireshark. Elles\npermettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans Wireshark",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2022-08 du 26 octobre 2022",
      "url": "https://www.wireshark.org/security/wnpa-sec-2022-08.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2022-07 du 26 octobre 2022",
      "url": "https://www.wireshark.org/security/wnpa-sec-2022-07.html"
    }
  ]
}

CERTFR-2022-AVI-803
Vulnerability from certfr_avis

Une vulnérabilité a été découverte dans Wireshark. Elle permet à un attaquant de provoquer un déni de service à distance.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Wireshark Wireshark Wireshark versions 3.6.x antérieures à 3.6.8
Wireshark Wireshark Wireshark versions 3.4.x antérieures à 3.4.16
References

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Wireshark versions 3.6.x ant\u00e9rieures \u00e0 3.6.8",
      "product": {
        "name": "Wireshark",
        "vendor": {
          "name": "Wireshark",
          "scada": false
        }
      }
    },
    {
      "description": "Wireshark versions 3.4.x ant\u00e9rieures \u00e0 3.4.16",
      "product": {
        "name": "Wireshark",
        "vendor": {
          "name": "Wireshark",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [],
  "initial_release_date": "2022-09-08T00:00:00",
  "last_revision_date": "2022-09-08T00:00:00",
  "links": [],
  "reference": "CERTFR-2022-AVI-803",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2022-09-08T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans Wireshark. Elle permet \u00e0 un\nattaquant de provoquer un d\u00e9ni de service \u00e0 distance.\n",
  "title": "Vuln\u00e9rabilit\u00e9 dans Wireshark",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2022-06 du 07 septembre 2022",
      "url": "https://www.wireshark.org/security/wnpa-sec-2022-06.html"
    }
  ]
}

CERTFR-2022-AVI-139
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans Wireshark. Elles permettent à un attaquant de provoquer un déni de service à distance.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Wireshark Wireshark Wireshark versions 3.4.x antérieures à 3.4.12
Wireshark Wireshark Wireshark versions 3.6.x antérieures à 3.6.2

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Wireshark versions 3.4.x ant\u00e9rieures \u00e0 3.4.12",
      "product": {
        "name": "Wireshark",
        "vendor": {
          "name": "Wireshark",
          "scada": false
        }
      }
    },
    {
      "description": "Wireshark versions 3.6.x ant\u00e9rieures \u00e0 3.6.2",
      "product": {
        "name": "Wireshark",
        "vendor": {
          "name": "Wireshark",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [],
  "initial_release_date": "2022-02-11T00:00:00",
  "last_revision_date": "2022-02-11T00:00:00",
  "links": [],
  "reference": "CERTFR-2022-AVI-139",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2022-02-11T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Wireshark. Elles\npermettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans Wireshark",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2022-01 du 10 f\u00e9vrier 2022",
      "url": "https://www.wireshark.org/security/wnpa-sec-2022-01.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2022-03 du 10 f\u00e9vrier 2022",
      "url": "https://www.wireshark.org/security/wnpa-sec-2022-03.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2022-05 du 10 f\u00e9vrier 2022",
      "url": "https://www.wireshark.org/security/wnpa-sec-2022-05.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2022-04 du 10 f\u00e9vrier 2022",
      "url": "https://www.wireshark.org/security/wnpa-sec-2022-04.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2022-02 du 10 f\u00e9vrier 2022",
      "url": "https://www.wireshark.org/security/wnpa-sec-2022-02.html"
    }
  ]
}

CERTFR-2021-AVI-989
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans Wireshark. Elles permettent à un attaquant de provoquer un déni de service à distance.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Wireshark Wireshark Wireshark versions 3.6.x antérieures à 3.6.1
Wireshark Wireshark Wireshark versions 3.4.x antérieures à 3.4.11

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Wireshark versions 3.6.x ant\u00e9rieures \u00e0 3.6.1",
      "product": {
        "name": "Wireshark",
        "vendor": {
          "name": "Wireshark",
          "scada": false
        }
      }
    },
    {
      "description": "Wireshark versions 3.4.x ant\u00e9rieures \u00e0 3.4.11",
      "product": {
        "name": "Wireshark",
        "vendor": {
          "name": "Wireshark",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2021-4182",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-4182"
    },
    {
      "name": "CVE-2021-4181",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-4181"
    },
    {
      "name": "CVE-2021-4185",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-4185"
    },
    {
      "name": "CVE-2021-4184",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-4184"
    },
    {
      "name": "CVE-2021-4186",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-4186"
    },
    {
      "name": "CVE-2021-4183",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-4183"
    }
  ],
  "initial_release_date": "2021-12-30T00:00:00",
  "last_revision_date": "2021-12-30T00:00:00",
  "links": [],
  "reference": "CERTFR-2021-AVI-989",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2021-12-30T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Wireshark. Elles\npermettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans Wireshark",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2021-16 du 29 d\u00e9cembre 2021",
      "url": "https://www.wireshark.org/security/wnpa-sec-2021-16.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2021-19 du 29 d\u00e9cembre 2021",
      "url": "https://www.wireshark.org/security/wnpa-sec-2021-19.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2021-18 du 29 d\u00e9cembre 2021",
      "url": "https://www.wireshark.org/security/wnpa-sec-2021-18.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2021-17 du 29 d\u00e9cembre 2021",
      "url": "https://www.wireshark.org/security/wnpa-sec-2021-17.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2021-22 du 29 d\u00e9cembre 2021",
      "url": "https://www.wireshark.org/security/wnpa-sec-2021-22.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2021-20 du 29 d\u00e9cembre 2021",
      "url": "https://www.wireshark.org/security/wnpa-sec-2021-20.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2021-21 du 29 d\u00e9cembre 2021",
      "url": "https://www.wireshark.org/security/wnpa-sec-2021-21.html"
    }
  ]
}

CERTFR-2021-AVI-882
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans Wireshark. Elles permettent à un attaquant de provoquer un déni de service.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Wireshark Wireshark Wireshark versions 3.2.x antérieures à 3.2.18
Wireshark Wireshark Wireshark versions 3.4.x antérieures à 3.4.10

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Wireshark versions 3.2.x ant\u00e9rieures \u00e0 3.2.18",
      "product": {
        "name": "Wireshark",
        "vendor": {
          "name": "Wireshark",
          "scada": false
        }
      }
    },
    {
      "description": "Wireshark versions 3.4.x ant\u00e9rieures \u00e0 3.4.10",
      "product": {
        "name": "Wireshark",
        "vendor": {
          "name": "Wireshark",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2021-39922",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-39922"
    },
    {
      "name": "CVE-2021-39924",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-39924"
    },
    {
      "name": "CVE-2021-39928",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-39928"
    },
    {
      "name": "CVE-2021-39926",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-39926"
    },
    {
      "name": "CVE-2021-39921",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-39921"
    },
    {
      "name": "CVE-2021-39925",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-39925"
    },
    {
      "name": "CVE-2021-39920",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-39920"
    },
    {
      "name": "CVE-2021-39929",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-39929"
    }
  ],
  "initial_release_date": "2021-11-18T00:00:00",
  "last_revision_date": "2021-11-18T00:00:00",
  "links": [],
  "reference": "CERTFR-2021-AVI-882",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2021-11-18T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Wireshark. Elles\npermettent \u00e0 un attaquant de provoquer un d\u00e9ni de service.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans Wireshark",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2021-07 du 17 novembre 2021",
      "url": "https://www.wireshark.org/security/wnpa-sec-2021-07.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2021-15 du 17 novembre 2021",
      "url": "https://www.wireshark.org/security/wnpa-sec-2021-15.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2021-14 du 17 novembre 2021",
      "url": "https://www.wireshark.org/security/wnpa-sec-2021-14.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2021-13 du 17 novembre 2021",
      "url": "https://www.wireshark.org/security/wnpa-sec-2021-13.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2021-10 du 17 novembre 2021",
      "url": "https://www.wireshark.org/security/wnpa-sec-2021-10.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2021-09 du 17 novembre 2021",
      "url": "https://www.wireshark.org/security/wnpa-sec-2021-09.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2021-11 du 17 novembre 2021",
      "url": "https://www.wireshark.org/security/wnpa-sec-2021-11.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2021-08 du 17 novembre 2021",
      "url": "https://www.wireshark.org/security/wnpa-sec-2021-08.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2021-12 du 17 novembre 2021",
      "url": "https://www.wireshark.org/security/wnpa-sec-2021-12.html"
    }
  ]
}

CERTFR-2021-AVI-541
Vulnerability from certfr_avis

Une vulnérabilité a été découverte dans Wireshark. Elle permet à un attaquant de provoquer un déni de service.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Wireshark Wireshark Wireshark versions 3.4.x antérieures à 3.4.7
Wireshark Wireshark Wireshark versions 3.2.x antérieures à 3.2.15
References

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Wireshark versions 3.4.x ant\u00e9rieures \u00e0 3.4.7",
      "product": {
        "name": "Wireshark",
        "vendor": {
          "name": "Wireshark",
          "scada": false
        }
      }
    },
    {
      "description": "Wireshark versions 3.2.x ant\u00e9rieures \u00e0 3.2.15",
      "product": {
        "name": "Wireshark",
        "vendor": {
          "name": "Wireshark",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2021-22235",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22235"
    }
  ],
  "initial_release_date": "2021-07-19T00:00:00",
  "last_revision_date": "2021-07-19T00:00:00",
  "links": [],
  "reference": "CERTFR-2021-AVI-541",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2021-07-19T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans Wireshark. Elle permet \u00e0 un\nattaquant de provoquer un d\u00e9ni de service.\n",
  "title": "Vuln\u00e9rabilit\u00e9 dans Wireshark",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2021-06 du 14 juillet 2021",
      "url": "https://www.wireshark.org/security/wnpa-sec-2021-06.html"
    }
  ]
}

CERTFR-2021-AVI-309
Vulnerability from certfr_avis

Une vulnérabilité a été découverte dans Wireshark. Elle permet à un attaquant de provoquer un déni de service à distance.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Wireshark Wireshark Wireshark versions 3.2.x antérieures à 3.2.13
Wireshark Wireshark Wireshark versions 3.4.x antérieures à 3.4.5

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Wireshark versions 3.2.x ant\u00e9rieures \u00e0 3.2.13",
      "product": {
        "name": "Wireshark",
        "vendor": {
          "name": "Wireshark",
          "scada": false
        }
      }
    },
    {
      "description": "Wireshark versions 3.4.x ant\u00e9rieures \u00e0 3.4.5",
      "product": {
        "name": "Wireshark",
        "vendor": {
          "name": "Wireshark",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2021-22207",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22207"
    }
  ],
  "initial_release_date": "2021-04-23T00:00:00",
  "last_revision_date": "2021-04-23T00:00:00",
  "links": [
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2021-04 du 23 avril 2021",
      "url": "https://www.wireshark.org/security/wnpa-sec-2021-04.html"
    }
  ],
  "reference": "CERTFR-2021-AVI-309",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2021-04-23T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans Wireshark. Elle permet \u00e0 un\nattaquant de provoquer un d\u00e9ni de service \u00e0 distance.\n",
  "title": "Vuln\u00e9rabilit\u00e9 dans Wireshark",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2021-04 du 23 avril 2021",
      "url": null
    }
  ]
}

CERTFR-2021-AVI-186
Vulnerability from certfr_avis

Une vulnérabilité a été découverte dans Wireshark. Elle permet à un attaquant de provoquer une atteinte à la confidentialité des données.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Wireshark Wireshark Wireshark versions 3.4.x antérieures à 3.4.4
Wireshark Wireshark Wireshark versions 3.2.x antérieures à 3.2.12
References

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Wireshark versions 3.4.x ant\u00e9rieures \u00e0 3.4.4",
      "product": {
        "name": "Wireshark",
        "vendor": {
          "name": "Wireshark",
          "scada": false
        }
      }
    },
    {
      "description": "Wireshark versions 3.2.x ant\u00e9rieures \u00e0 3.2.12",
      "product": {
        "name": "Wireshark",
        "vendor": {
          "name": "Wireshark",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2021-22191",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22191"
    }
  ],
  "initial_release_date": "2021-03-11T00:00:00",
  "last_revision_date": "2021-03-11T00:00:00",
  "links": [],
  "reference": "CERTFR-2021-AVI-186",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2021-03-11T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans Wireshark. Elle permet \u00e0 un\nattaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
  "title": "Vuln\u00e9rabilit\u00e9 dans Wireshark",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2021-03 du 10 mars 2021",
      "url": "https://www.wireshark.org/security/wnpa-sec-2021-03.html"
    }
  ]
}

CERTFR-2021-AVI-069
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans Wireshark. Elles permettent à un attaquant de provoquer un déni de service à distance.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Wireshark Wireshark Wireshark versions 3.4.x antérieures à 3.4.3

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Wireshark versions 3.4.x ant\u00e9rieures \u00e0 3.4.3",
      "product": {
        "name": "Wireshark",
        "vendor": {
          "name": "Wireshark",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [],
  "initial_release_date": "2021-02-01T00:00:00",
  "last_revision_date": "2021-02-01T00:00:00",
  "links": [],
  "reference": "CERTFR-2021-AVI-069",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2021-02-01T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Wireshark. Elles\npermettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans Wireshark",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2021-02 du 29 janvier 2021",
      "url": "https://www.wireshark.org/security/wnpa-sec-2021-02.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2021-01 du 29 janvier 2021",
      "url": "https://www.wireshark.org/security/wnpa-sec-2021-01.html"
    }
  ]
}

CERTFR-2020-AVI-833
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans Wireshark. Elles permettent à un attaquant de provoquer un déni de service à distance.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Wireshark Wireshark Wireshark versions 3.2.x antérieures à 3.2.9
Wireshark Wireshark Wireshark versions 3.4.x antérieures à 3.4.2

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Wireshark versions 3.2.x ant\u00e9rieures \u00e0 3.2.9",
      "product": {
        "name": "Wireshark",
        "vendor": {
          "name": "Wireshark",
          "scada": false
        }
      }
    },
    {
      "description": "Wireshark versions 3.4.x ant\u00e9rieures \u00e0 3.4.2",
      "product": {
        "name": "Wireshark",
        "vendor": {
          "name": "Wireshark",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2020-26421",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-26421"
    },
    {
      "name": "CVE-2020-26420",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-26420"
    },
    {
      "name": "CVE-2020-26418",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-26418"
    },
    {
      "name": "CVE-2020-26419",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-26419"
    },
    {
      "name": "CVE-2020-26422",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-26422"
    }
  ],
  "initial_release_date": "2020-12-21T00:00:00",
  "last_revision_date": "2020-12-21T00:00:00",
  "links": [],
  "reference": "CERTFR-2020-AVI-833",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2020-12-21T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Wireshark. Elles\npermettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans Wireshark",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2020-16 du 09 d\u00e9cembre 2020",
      "url": "https://www.wireshark.org/security/wnpa-sec-2020-16.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2020-20 du 18 d\u00e9cembre 2020",
      "url": "https://www.wireshark.org/security/wnpa-sec-2020-20.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2020-19 du 09 d\u00e9cembre 2020",
      "url": "https://www.wireshark.org/security/wnpa-sec-2020-19.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2020-17 du 09 d\u00e9cembre 2020",
      "url": "https://www.wireshark.org/security/wnpa-sec-2020-17.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2020-18 du 09 d\u00e9cembre 2020",
      "url": "https://www.wireshark.org/security/wnpa-sec-2020-18.html"
    }
  ]
}