Refine your search
99 vulnerabilities found for Wireshark by Wireshark
CERTFR-2025-AVI-0857
Vulnerability from certfr_avis
Une vulnérabilité a été découverte dans Wireshark. Elle permet à un attaquant de provoquer un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Title | Publication Time | Tags | |||
---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Wireshark versions 4.2.x ant\u00e9rieures \u00e0 4.2.14", "product": { "name": "Wireshark", "vendor": { "name": "Wireshark", "scada": false } } }, { "description": "Wireshark versions 4.4.x ant\u00e9rieures \u00e0 4.4.10", "product": { "name": "Wireshark", "vendor": { "name": "Wireshark", "scada": false } } } ], "affected_systems_content": "", "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).", "cves": [], "initial_release_date": "2025-10-09T00:00:00", "last_revision_date": "2025-10-09T00:00:00", "links": [], "reference": "CERTFR-2025-AVI-0857", "revisions": [ { "description": "Version initiale", "revision_date": "2025-10-09T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" } ], "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans Wireshark. Elle permet \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance.", "title": "Vuln\u00e9rabilit\u00e9 dans Wireshark", "vendor_advisories": [ { "published_at": "2025-10-09", "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2025-04", "url": "https://www.wireshark.org/security/wnpa-sec-2025-04.html" } ] }
CERTFR-2025-AVI-0741
Vulnerability from certfr_avis
Une vulnérabilité a été découverte dans Wireshark. Elle permet à un attaquant de provoquer un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Title | Publication Time | Tags | |||
---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Wireshark versions 4.4.x ant\u00e9rieures \u00e0 4.4.9", "product": { "name": "Wireshark", "vendor": { "name": "Wireshark", "scada": false } } } ], "affected_systems_content": "", "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).", "cves": [], "initial_release_date": "2025-08-29T00:00:00", "last_revision_date": "2025-08-29T00:00:00", "links": [], "reference": "CERTFR-2025-AVI-0741", "revisions": [ { "description": "Version initiale", "revision_date": "2025-08-29T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" } ], "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans Wireshark. Elle permet \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance.", "title": "Vuln\u00e9rabilit\u00e9 dans Wireshark", "vendor_advisories": [ { "published_at": "2025-08-29", "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2025-03", "url": "https://www.wireshark.org/security/wnpa-sec-2025-03.html" } ] }
CERTFR-2025-AVI-0478
Vulnerability from certfr_avis
Une vulnérabilité a été découverte dans Wireshark. Elle permet à un attaquant de provoquer un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Title | Publication Time | Tags | |||
---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Wireshark versions 4.4.x ant\u00e9rieures \u00e0 4.4.7", "product": { "name": "Wireshark", "vendor": { "name": "Wireshark", "scada": false } } }, { "description": "Wireshark versions 4.2.x ant\u00e9rieures \u00e0 4.2.12", "product": { "name": "Wireshark", "vendor": { "name": "Wireshark", "scada": false } } } ], "affected_systems_content": "", "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).", "cves": [ { "name": "CVE-2025-5601", "url": "https://www.cve.org/CVERecord?id=CVE-2025-5601" } ], "initial_release_date": "2025-06-05T00:00:00", "last_revision_date": "2025-06-05T00:00:00", "links": [], "reference": "CERTFR-2025-AVI-0478", "revisions": [ { "description": "Version initiale", "revision_date": "2025-06-05T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" } ], "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans Wireshark. Elle permet \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance.", "title": "Vuln\u00e9rabilit\u00e9 dans Wireshark", "vendor_advisories": [ { "published_at": "2025-06-05", "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2025-02", "url": "https://www.wireshark.org/security/wnpa-sec-2025-02.html" } ] }
CERTFR-2025-AVI-0145
Vulnerability from certfr_avis
Une vulnérabilité a été découverte dans Wireshark. Elle permet à un attaquant de provoquer un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Title | Publication Time | Tags | |||
---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Wireshark versions 4.2.x ant\u00e9rieures \u00e0 4.2.11", "product": { "name": "Wireshark", "vendor": { "name": "Wireshark", "scada": false } } }, { "description": "Wireshark versions 4.4.x ant\u00e9rieures \u00e0 4.4.4", "product": { "name": "Wireshark", "vendor": { "name": "Wireshark", "scada": false } } } ], "affected_systems_content": "", "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).", "cves": [ { "name": "CVE-2025-1492", "url": "https://www.cve.org/CVERecord?id=CVE-2025-1492" } ], "initial_release_date": "2025-02-20T00:00:00", "last_revision_date": "2025-02-20T00:00:00", "links": [], "reference": "CERTFR-2025-AVI-0145", "revisions": [ { "description": "Version initiale", "revision_date": "2025-02-20T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" } ], "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans Wireshark. Elle permet \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance.", "title": "Vuln\u00e9rabilit\u00e9 dans Wireshark", "vendor_advisories": [ { "published_at": "2025-04-09", "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2025-01", "url": "https://www.wireshark.org/security/wnpa-sec-2025-01.html" } ] }
CERTFR-2024-AVI-1008
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Wireshark. Elles permettent à un attaquant de provoquer un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Title | Publication Time | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Wireshark versions 4.4.x ant\u00e9rieures \u00e0 4.4.2", "product": { "name": "Wireshark", "vendor": { "name": "Wireshark", "scada": false } } }, { "description": "Wireshark versions 4.2.x ant\u00e9rieures \u00e0 4.2.9", "product": { "name": "Wireshark", "vendor": { "name": "Wireshark", "scada": false } } } ], "affected_systems_content": "", "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).", "cves": [], "initial_release_date": "2024-11-21T00:00:00", "last_revision_date": "2024-11-21T00:00:00", "links": [], "reference": "CERTFR-2024-AVI-1008", "revisions": [ { "description": "Version initiale", "revision_date": "2024-11-21T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Wireshark. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance.", "title": "Multiples vuln\u00e9rabilit\u00e9s dans Wireshark", "vendor_advisories": [ { "published_at": "2024-11-21", "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2024-14", "url": "https://www.wireshark.org/security/wnpa-sec-2024-14.html" }, { "published_at": "2024-11-21", "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2024-15", "url": "https://www.wireshark.org/security/wnpa-sec-2024-15.html" } ] }
CERTFR-2024-AVI-0861
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Wireshark. Elles permettent à un attaquant de provoquer un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Title | Publication Time | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Wireshark versions 4.2.x ant\u00e9rieures \u00e0 4.2.8", "product": { "name": "Wireshark", "vendor": { "name": "Wireshark", "scada": false } } }, { "description": "Wireshark versions 4.0.x ant\u00e9rieures \u00e0 4.0.1", "product": { "name": "Wireshark", "vendor": { "name": "Wireshark", "scada": false } } } ], "affected_systems_content": "", "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).", "cves": [], "initial_release_date": "2024-10-10T00:00:00", "last_revision_date": "2024-10-10T00:00:00", "links": [], "reference": "CERTFR-2024-AVI-0861", "revisions": [ { "description": "Version initiale", "revision_date": "2024-10-10T00:00:00.000000" }, { "description": "Correction de l\u0027\u00e9diteur, les versions 4.4.x sont affect\u00e9es, et non les versions 4.0.x", "revision_date": "2024-10-10T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Wireshark. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance.", "title": "Multiples vuln\u00e9rabilit\u00e9s dans Wireshark", "vendor_advisories": [ { "published_at": "2024-10-10", "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2024-13", "url": "https://www.wireshark.org/security/wnpa-sec-2024-13.html" }, { "published_at": "2024-10-10", "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2024-12", "url": "https://www.wireshark.org/security/wnpa-sec-2024-12.html" } ] }
CERTFR-2024-AVI-0568
Vulnerability from certfr_avis
Une vulnérabilité a été découverte dans Wireshark. Elle permet à un attaquant de provoquer un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Title | Publication Time | Tags | |||
---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Wireshark versions 4.0.x ant\u00e9rieures \u00e0 4.0.16", "product": { "name": "Wireshark", "vendor": { "name": "Wireshark", "scada": false } } }, { "description": "Wireshark versions 4.2.x ant\u00e9rieures \u00e0 4.2.6", "product": { "name": "Wireshark", "vendor": { "name": "Wireshark", "scada": false } } } ], "affected_systems_content": "", "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).", "cves": [], "initial_release_date": "2024-07-11T00:00:00", "last_revision_date": "2024-07-11T00:00:00", "links": [], "reference": "CERTFR-2024-AVI-0568", "revisions": [ { "description": "Version initiale", "revision_date": "2024-07-11T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" } ], "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans Wireshark. Elle permet \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance.", "title": "Vuln\u00e9rabilit\u00e9 dans Wireshark", "vendor_advisories": [ { "published_at": "2024-07-11", "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2024-10", "url": "https://www.wireshark.org/security/wnpa-sec-2024-10.html" } ] }
CERTFR-2024-AVI-0411
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Wireshark. Elles permettent à un attaquant de provoquer un déni de service.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneTitle | Publication Time | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Wireshark versions 3.6.x ant\u00e9rieures \u00e0 3.6.23", "product": { "name": "Wireshark", "vendor": { "name": "Wireshark", "scada": false } } }, { "description": "Wireshark versions 4.2.x ant\u00e9rieures \u00e0 4.2.5", "product": { "name": "Wireshark", "vendor": { "name": "Wireshark", "scada": false } } }, { "description": "Wireshark versions 4.0.x ant\u00e9rieures \u00e0 4.0.15", "product": { "name": "Wireshark", "vendor": { "name": "Wireshark", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2024-4855", "url": "https://www.cve.org/CVERecord?id=CVE-2024-4855" }, { "name": "CVE-2024-4853", "url": "https://www.cve.org/CVERecord?id=CVE-2024-4853" }, { "name": "CVE-2024-4854", "url": "https://www.cve.org/CVERecord?id=CVE-2024-4854" } ], "initial_release_date": "2024-05-16T00:00:00", "last_revision_date": "2024-05-16T00:00:00", "links": [], "reference": "CERTFR-2024-AVI-0411", "revisions": [ { "description": "Version initiale", "revision_date": "2024-05-16T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits Wireshark\u003c/span\u003e. Elles permettent \u00e0 un\nattaquant de provoquer un d\u00e9ni de service.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans Wireshark", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2024-09 du 16 mai 2024", "url": "https://www.wireshark.org/security/wnpa-sec-2024-09.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2024-08 du 16 mai 2024", "url": "https://www.wireshark.org/security/wnpa-sec-2024-08.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2024-07 du 16 mai 2024", "url": "https://www.wireshark.org/security/wnpa-sec-2024-07.html" } ] }
CERTFR-2024-AVI-0256
Vulnerability from certfr_avis
Une vulnérabilité a été découverte dans Wireshark. Elle permet à un attaquant de provoquer un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneTitle | Publication Time | Tags | |||
---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Wireshark versions 4.0.x ant\u00e9rieures \u00e0 4.0.14", "product": { "name": "Wireshark", "vendor": { "name": "Wireshark", "scada": false } } }, { "description": "Wireshark versions 4.2.x ant\u00e9rieures \u00e0 4.2.4", "product": { "name": "Wireshark", "vendor": { "name": "Wireshark", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2024-2955", "url": "https://www.cve.org/CVERecord?id=CVE-2024-2955" } ], "initial_release_date": "2024-03-28T00:00:00", "last_revision_date": "2024-03-28T00:00:00", "links": [], "reference": "CERTFR-2024-AVI-0256", "revisions": [ { "description": "Version initiale", "revision_date": "2024-03-28T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" } ], "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans Wireshark. Elle permet \u00e0 un\nattaquant de provoquer un d\u00e9ni de service \u00e0 distance.\n", "title": "Vuln\u00e9rabilit\u00e9 dans Wireshark", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2024-06 du 27 mars 2024", "url": "https://www.wireshark.org/security/wnpa-sec-2024-06.html" } ] }
CERTFR-2024-AVI-0007
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Wireshark. Elles permettent à un attaquant de provoquer un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneTitle | Publication Time | Tags | |
---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Wireshark versions 4.0.x ant\u00e9rieures \u00e0 4.0.12", "product": { "name": "Wireshark", "vendor": { "name": "Wireshark", "scada": false } } }, { "description": "Wireshark versions 3.6.x ant\u00e9rieures \u00e0 3.6.20", "product": { "name": "Wireshark", "vendor": { "name": "Wireshark", "scada": false } } }, { "description": "Wireshark versions 4.2.x ant\u00e9rieures \u00e0 4.2.1", "product": { "name": "Wireshark", "vendor": { "name": "Wireshark", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2024-0209", "url": "https://www.cve.org/CVERecord?id=CVE-2024-0209" }, { "name": "CVE-2024-0208", "url": "https://www.cve.org/CVERecord?id=CVE-2024-0208" }, { "name": "CVE-2024-0207", "url": "https://www.cve.org/CVERecord?id=CVE-2024-0207" }, { "name": "CVE-2024-0210", "url": "https://www.cve.org/CVERecord?id=CVE-2024-0210" } ], "initial_release_date": "2024-01-05T00:00:00", "last_revision_date": "2024-01-05T00:00:00", "links": [ { "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2024-03 du 04 janvier 2024", "url": "https://www.wireshark.org/security/wnpa-sec-2024-03.html" }, { "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2024-01 du 04 janvier 2024", "url": "https://www.wireshark.org/security/wnpa-sec-2024-01.html" }, { "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2024-02 du 04 janvier 2024", "url": "https://www.wireshark.org/security/wnpa-sec-2024-02.html" }, { "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2024-04 du 04 janvier 2024", "url": "https://www.wireshark.org/security/wnpa-sec-2024-04.html" } ], "reference": "CERTFR-2024-AVI-0007", "revisions": [ { "description": "Version initiale", "revision_date": "2024-01-05T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits Wireshark\u003c/span\u003e. Elles permettent \u00e0 un\nattaquant de provoquer un d\u00e9ni de service \u00e0 distance.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans Wireshark", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2024-02 du 03 janvier 2024", "url": null }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2024-04 du 03 janvier 2024", "url": null }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2024-01 du 03 janvier 2024", "url": null }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2024-03 du 03 janvier 2024", "url": null } ] }
CERTFR-2024-AVI-0005
Vulnerability from certfr_avis
Une vulnérabilité a été découverte dans Wireshark. Elle permet à un attaquant de provoquer un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneTitle | Publication Time | Tags | |||
---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Wireshark versions ant\u00e9rieures \u00e0 4.2.1", "product": { "name": "Wireshark", "vendor": { "name": "Wireshark", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2024-0211", "url": "https://www.cve.org/CVERecord?id=CVE-2024-0211" } ], "initial_release_date": "2024-01-04T00:00:00", "last_revision_date": "2024-01-04T00:00:00", "links": [], "reference": "CERTFR-2024-AVI-0005", "revisions": [ { "description": "Version initiale", "revision_date": "2024-01-04T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" } ], "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans \u003cspan\nclass=\"textit\"\u003eWireshark\u003c/span\u003e. Elle permet \u00e0 un attaquant de provoquer\nun d\u00e9ni de service \u00e0 distance.\n", "title": "Vuln\u00e9rabilit\u00e9 dans Wireshark", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2024-05 du 03 janvier 2024", "url": "https://www.wireshark.org/security/wnpa-sec-2024-05.html" } ] }
CERTFR-2023-AVI-0949
Vulnerability from certfr_avis
Une vulnérabilité a été découverte dans Wireshark NetScreen file parser. Elle permet à un attaquant de provoquer un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneTitle | Publication Time | Tags | |||
---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Wireshark NetScreen file parser versions 3.6.x ant\u00e9rieures \u00e0 3.6.19", "product": { "name": "Wireshark", "vendor": { "name": "Wireshark", "scada": false } } }, { "description": "Wireshark NetScreen file parser versions 4.0.x ant\u00e9rieures \u00e0 4.0.11", "product": { "name": "Wireshark", "vendor": { "name": "Wireshark", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2023-6175", "url": "https://www.cve.org/CVERecord?id=CVE-2023-6175" } ], "initial_release_date": "2023-11-16T00:00:00", "last_revision_date": "2023-11-16T00:00:00", "links": [], "reference": "CERTFR-2023-AVI-0949", "revisions": [ { "description": "Version initiale", "revision_date": "2023-11-16T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" } ], "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans \u003cspan class=\"textit\"\u003eWireshark\nNetScreen file parser\u003c/span\u003e. Elle permet \u00e0 un attaquant de provoquer un\nd\u00e9ni de service \u00e0 distance.\n", "title": "Vuln\u00e9rabilit\u00e9 dans Wireshark NetScreen file parser", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2023-29 du 16 novembre 2023", "url": "https://www.wireshark.org/security/wnpa-sec-2023-29.html" } ] }
CERTFR-2023-AVI-0808
Vulnerability from certfr_avis
Une vulnérabilité a été découverte dans Wireshark. Elle permet à un attaquant de provoquer un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneTitle | Publication Time | Tags | |||
---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Wireshark versions 4.x ant\u00e9rieures \u00e0 4.0.9", "product": { "name": "Wireshark", "vendor": { "name": "Wireshark", "scada": false } } }, { "description": "Wireshark versions 3.x ant\u00e9rieures \u00e0 3.6.17", "product": { "name": "Wireshark", "vendor": { "name": "Wireshark", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2023-5371", "url": "https://www.cve.org/CVERecord?id=CVE-2023-5371" } ], "initial_release_date": "2023-10-05T00:00:00", "last_revision_date": "2023-10-05T00:00:00", "links": [], "reference": "CERTFR-2023-AVI-0808", "revisions": [ { "description": "Version initiale", "revision_date": "2023-10-05T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" } ], "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans \u003cspan\nclass=\"textit\"\u003eWireshark\u003c/span\u003e. Elle permet \u00e0 un attaquant de provoquer\nun d\u00e9ni de service \u00e0 distance.\n", "title": "Vuln\u00e9rabilit\u00e9 dans Wireshark", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2023-27 du 05 octobre 2023", "url": "https://www.wireshark.org/security/wnpa-sec-2023-27.html" } ] }
CERTFR-2023-AVI-0678
Vulnerability from certfr_avis
Une vulnérabilité a été découverte dans Wireshark. Elle permet à un attaquant de provoquer un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneTitle | Publication Time | Tags | |||
---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Wireshark versions 4.0.x ant\u00e9rieures \u00e0 4.0.8", "product": { "name": "Wireshark", "vendor": { "name": "Wireshark", "scada": false } } }, { "description": "Wireshark versions 3.6.x ant\u00e9rieures \u00e0 3.6.16", "product": { "name": "Wireshark", "vendor": { "name": "Wireshark", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [], "initial_release_date": "2023-08-24T00:00:00", "last_revision_date": "2023-08-24T00:00:00", "links": [], "reference": "CERTFR-2023-AVI-0678", "revisions": [ { "description": "Version initiale", "revision_date": "2023-08-24T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" } ], "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans Wireshark. Elle permet \u00e0 un\nattaquant de provoquer un d\u00e9ni de service \u00e0 distance.\n", "title": "Vuln\u00e9rabilit\u00e9 dans Wireshark", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2023-26 du 23 ao\u00fbt 2023", "url": "https://www.wireshark.org/security/wnpa-sec-2023-26.html" } ] }
CERTFR-2023-AVI-0539
Vulnerability from certfr_avis
Une vulnérabilité a été découverte dans Wireshark. Elle permet à un attaquant de provoquer un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneTitle | Publication Time | Tags | |||
---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Wireshark versions 4.0.x ant\u00e9rieures \u00e0 4.0.7", "product": { "name": "Wireshark", "vendor": { "name": "Wireshark", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [], "initial_release_date": "2023-07-13T00:00:00", "last_revision_date": "2023-07-13T00:00:00", "links": [], "reference": "CERTFR-2023-AVI-0539", "revisions": [ { "description": "Version initiale", "revision_date": "2023-07-13T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" } ], "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans \u003cspan\nclass=\"textit\"\u003eWireshark\u003c/span\u003e. Elle permet \u00e0 un attaquant de provoquer\nun d\u00e9ni de service \u00e0 distance.\n", "title": "Vuln\u00e9rabilit\u00e9 dans Wireshark", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2023-22 du 13 juillet 2023", "url": "https://www.wireshark.org/security/wnpa-sec-2023-22.html" } ] }
CERTFR-2023-AVI-0409
Vulnerability from certfr_avis
Une vulnérabilité a été découverte dans Wireshark. Elle permet à un attaquant de provoquer un déni de service.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneTitle | Publication Time | Tags | |||
---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Wireshark versions 4.0.x ant\u00e9rieures \u00e0 4.0.6", "product": { "name": "Wireshark", "vendor": { "name": "Wireshark", "scada": false } } }, { "description": "Wireshark versions 3.6.x ant\u00e9rieures \u00e0 3.6.14", "product": { "name": "Wireshark", "vendor": { "name": "Wireshark", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [], "initial_release_date": "2023-05-25T00:00:00", "last_revision_date": "2023-05-25T00:00:00", "links": [], "reference": "CERTFR-2023-AVI-0409", "revisions": [ { "description": "Version initiale", "revision_date": "2023-05-25T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service" } ], "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans \u003cspan\nclass=\"textit\"\u003eWireshark\u003c/span\u003e. Elle permet \u00e0 un attaquant de provoquer\nun d\u00e9ni de service.\n", "title": "Vuln\u00e9rabilit\u00e9 dans Wireshark", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2023-20 du 24 mai 2023", "url": "https://www.wireshark.org/security/wnpa-sec-2023-20.html" } ] }
CERTFR-2023-AVI-0312
Vulnerability from certfr_avis
Une vulnérabilité a été découverte dans Wireshark. Elle permet à un attaquant de provoquer un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneTitle | Publication Time | Tags | |||
---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Wireshark versions 4.0.x ant\u00e9rieures \u00e0 4.0.5", "product": { "name": "Wireshark", "vendor": { "name": "Wireshark", "scada": false } } }, { "description": "Wireshark versions 3.6.x ant\u00e9rieures \u00e0 3.6.13", "product": { "name": "Wireshark", "vendor": { "name": "Wireshark", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2023-1994", "url": "https://www.cve.org/CVERecord?id=CVE-2023-1994" } ], "initial_release_date": "2023-04-13T00:00:00", "last_revision_date": "2023-04-13T00:00:00", "links": [], "reference": "CERTFR-2023-AVI-0312", "revisions": [ { "description": "Version initiale", "revision_date": "2023-04-13T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" } ], "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans Wireshark. Elle permet \u00e0 un\nattaquant de provoquer un d\u00e9ni de service \u00e0 distance.\n", "title": "Vuln\u00e9rabilit\u00e9 dans Wireshark", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2023-11 du 12 avril 2023", "url": "https://www.wireshark.org/security/wnpa-sec-2023-11.html" } ] }
CERTFR-2023-AVI-0191
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Wireshark. Elles permettent à un attaquant de provoquer un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneTitle | Publication Time | Tags | |||
---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Wireshark versions 4.0.x ant\u00e9rieures \u00e0 4.0.4", "product": { "name": "Wireshark", "vendor": { "name": "Wireshark", "scada": false } } }, { "description": "Wireshark versions 3.6.x ant\u00e9rieures \u00e0 3.6.12", "product": { "name": "Wireshark", "vendor": { "name": "Wireshark", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2023-1161", "url": "https://www.cve.org/CVERecord?id=CVE-2023-1161" } ], "initial_release_date": "2023-03-03T00:00:00", "last_revision_date": "2023-03-07T00:00:00", "links": [], "reference": "CERTFR-2023-AVI-0191", "revisions": [ { "description": "Version initiale", "revision_date": "2023-03-03T00:00:00.000000" }, { "description": "Correction erreur sur les versions 3.6.x", "revision_date": "2023-03-06T00:00:00.000000" }, { "description": "Ajout du num\u00e9ro de CVE", "revision_date": "2023-03-07T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Wireshark. Elles\npermettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans Wireshark", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2023-08 du 02 mars 2023", "url": "https://www.wireshark.org/security/wnpa-sec-2023-08.html" } ] }
CERTFR-2023-AVI-0042
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Wireshark. Elles permettent à un attaquant de provoquer un déni de service à distance et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneTitle | Publication Time | Tags | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Wireshark versions 4.0.x ant\u00e9rieures \u00e0 4.0.3", "product": { "name": "Wireshark", "vendor": { "name": "Wireshark", "scada": false } } }, { "description": "Wireshark versions 3.6.x ant\u00e9rieures \u00e0 3.6.11", "product": { "name": "Wireshark", "vendor": { "name": "Wireshark", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [], "initial_release_date": "2023-01-19T00:00:00", "last_revision_date": "2023-01-19T00:00:00", "links": [], "reference": "CERTFR-2023-AVI-0042", "revisions": [ { "description": "Version initiale", "revision_date": "2023-01-19T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Wireshark. Elles\npermettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance et\nune atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans Wireshark", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2023-03 du 18 janvier 2023", "url": "https://www.wireshark.org/security/wnpa-sec-2023-03.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2023-07 du 18 janvier 2023", "url": "https://www.wireshark.org/security/wnpa-sec-2023-07.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2023-05 du 18 janvier 2023", "url": "https://www.wireshark.org/security/wnpa-sec-2023-05.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2023-02 du 18 janvier 2023", "url": "https://www.wireshark.org/security/wnpa-sec-2023-02.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2023-04 du 18 janvier 2023", "url": "https://www.wireshark.org/security/wnpa-sec-2023-04.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2023-06 du 18 janvier 2023", "url": "https://www.wireshark.org/security/wnpa-sec-2023-06.html" } ] }
CERTFR-2022-AVI-1082
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Wireshark. Elles permettent à un attaquant de provoquer un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneTitle | Publication Time | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Wireshark versions 3.6.x ant\u00e9rieures \u00e0 3.6.10", "product": { "name": "Wireshark", "vendor": { "name": "Wireshark", "scada": false } } }, { "description": "Wireshark versions 4.0.x ant\u00e9rieures \u00e0 4.0.2", "product": { "name": "Wireshark", "vendor": { "name": "Wireshark", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [], "initial_release_date": "2022-12-08T00:00:00", "last_revision_date": "2022-12-08T00:00:00", "links": [], "reference": "CERTFR-2022-AVI-1082", "revisions": [ { "description": "Version initiale", "revision_date": "2022-12-08T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Wireshark. Elles\npermettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans Wireshark", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2022-09 du 07 d\u00e9cembre 2022", "url": "https://www.wireshark.org/security/wnpa-sec-2022-09.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2022-10 du 07 d\u00e9cembre 2022", "url": "https://www.wireshark.org/security/wnpa-sec-2022-10.html" } ] }
CERTFR-2022-AVI-958
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Wireshark. Elles permettent à un attaquant de provoquer un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneTitle | Publication Time | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Wireshark versions 3.6.x ant\u00e9rieures \u00e0 3.6.9", "product": { "name": "Wireshark", "vendor": { "name": "Wireshark", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [], "initial_release_date": "2022-10-27T00:00:00", "last_revision_date": "2022-10-27T00:00:00", "links": [], "reference": "CERTFR-2022-AVI-958", "revisions": [ { "description": "Version initiale", "revision_date": "2022-10-27T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Wireshark. Elles\npermettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans Wireshark", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2022-08 du 26 octobre 2022", "url": "https://www.wireshark.org/security/wnpa-sec-2022-08.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2022-07 du 26 octobre 2022", "url": "https://www.wireshark.org/security/wnpa-sec-2022-07.html" } ] }
CERTFR-2022-AVI-803
Vulnerability from certfr_avis
Une vulnérabilité a été découverte dans Wireshark. Elle permet à un attaquant de provoquer un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneTitle | Publication Time | Tags | |||
---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Wireshark versions 3.6.x ant\u00e9rieures \u00e0 3.6.8", "product": { "name": "Wireshark", "vendor": { "name": "Wireshark", "scada": false } } }, { "description": "Wireshark versions 3.4.x ant\u00e9rieures \u00e0 3.4.16", "product": { "name": "Wireshark", "vendor": { "name": "Wireshark", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [], "initial_release_date": "2022-09-08T00:00:00", "last_revision_date": "2022-09-08T00:00:00", "links": [], "reference": "CERTFR-2022-AVI-803", "revisions": [ { "description": "Version initiale", "revision_date": "2022-09-08T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" } ], "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans Wireshark. Elle permet \u00e0 un\nattaquant de provoquer un d\u00e9ni de service \u00e0 distance.\n", "title": "Vuln\u00e9rabilit\u00e9 dans Wireshark", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2022-06 du 07 septembre 2022", "url": "https://www.wireshark.org/security/wnpa-sec-2022-06.html" } ] }
CERTFR-2022-AVI-139
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Wireshark. Elles permettent à un attaquant de provoquer un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneTitle | Publication Time | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Wireshark versions 3.4.x ant\u00e9rieures \u00e0 3.4.12", "product": { "name": "Wireshark", "vendor": { "name": "Wireshark", "scada": false } } }, { "description": "Wireshark versions 3.6.x ant\u00e9rieures \u00e0 3.6.2", "product": { "name": "Wireshark", "vendor": { "name": "Wireshark", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [], "initial_release_date": "2022-02-11T00:00:00", "last_revision_date": "2022-02-11T00:00:00", "links": [], "reference": "CERTFR-2022-AVI-139", "revisions": [ { "description": "Version initiale", "revision_date": "2022-02-11T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Wireshark. Elles\npermettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans Wireshark", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2022-01 du 10 f\u00e9vrier 2022", "url": "https://www.wireshark.org/security/wnpa-sec-2022-01.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2022-03 du 10 f\u00e9vrier 2022", "url": "https://www.wireshark.org/security/wnpa-sec-2022-03.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2022-05 du 10 f\u00e9vrier 2022", "url": "https://www.wireshark.org/security/wnpa-sec-2022-05.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2022-04 du 10 f\u00e9vrier 2022", "url": "https://www.wireshark.org/security/wnpa-sec-2022-04.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2022-02 du 10 f\u00e9vrier 2022", "url": "https://www.wireshark.org/security/wnpa-sec-2022-02.html" } ] }
CERTFR-2021-AVI-989
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Wireshark. Elles permettent à un attaquant de provoquer un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneTitle | Publication Time | Tags | |||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Wireshark versions 3.6.x ant\u00e9rieures \u00e0 3.6.1", "product": { "name": "Wireshark", "vendor": { "name": "Wireshark", "scada": false } } }, { "description": "Wireshark versions 3.4.x ant\u00e9rieures \u00e0 3.4.11", "product": { "name": "Wireshark", "vendor": { "name": "Wireshark", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2021-4182", "url": "https://www.cve.org/CVERecord?id=CVE-2021-4182" }, { "name": "CVE-2021-4181", "url": "https://www.cve.org/CVERecord?id=CVE-2021-4181" }, { "name": "CVE-2021-4185", "url": "https://www.cve.org/CVERecord?id=CVE-2021-4185" }, { "name": "CVE-2021-4184", "url": "https://www.cve.org/CVERecord?id=CVE-2021-4184" }, { "name": "CVE-2021-4186", "url": "https://www.cve.org/CVERecord?id=CVE-2021-4186" }, { "name": "CVE-2021-4183", "url": "https://www.cve.org/CVERecord?id=CVE-2021-4183" } ], "initial_release_date": "2021-12-30T00:00:00", "last_revision_date": "2021-12-30T00:00:00", "links": [], "reference": "CERTFR-2021-AVI-989", "revisions": [ { "description": "Version initiale", "revision_date": "2021-12-30T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Wireshark. Elles\npermettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans Wireshark", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2021-16 du 29 d\u00e9cembre 2021", "url": "https://www.wireshark.org/security/wnpa-sec-2021-16.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2021-19 du 29 d\u00e9cembre 2021", "url": "https://www.wireshark.org/security/wnpa-sec-2021-19.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2021-18 du 29 d\u00e9cembre 2021", "url": "https://www.wireshark.org/security/wnpa-sec-2021-18.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2021-17 du 29 d\u00e9cembre 2021", "url": "https://www.wireshark.org/security/wnpa-sec-2021-17.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2021-22 du 29 d\u00e9cembre 2021", "url": "https://www.wireshark.org/security/wnpa-sec-2021-22.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2021-20 du 29 d\u00e9cembre 2021", "url": "https://www.wireshark.org/security/wnpa-sec-2021-20.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2021-21 du 29 d\u00e9cembre 2021", "url": "https://www.wireshark.org/security/wnpa-sec-2021-21.html" } ] }
CERTFR-2021-AVI-882
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Wireshark. Elles permettent à un attaquant de provoquer un déni de service.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneTitle | Publication Time | Tags | |||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Wireshark versions 3.2.x ant\u00e9rieures \u00e0 3.2.18", "product": { "name": "Wireshark", "vendor": { "name": "Wireshark", "scada": false } } }, { "description": "Wireshark versions 3.4.x ant\u00e9rieures \u00e0 3.4.10", "product": { "name": "Wireshark", "vendor": { "name": "Wireshark", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2021-39922", "url": "https://www.cve.org/CVERecord?id=CVE-2021-39922" }, { "name": "CVE-2021-39924", "url": "https://www.cve.org/CVERecord?id=CVE-2021-39924" }, { "name": "CVE-2021-39928", "url": "https://www.cve.org/CVERecord?id=CVE-2021-39928" }, { "name": "CVE-2021-39926", "url": "https://www.cve.org/CVERecord?id=CVE-2021-39926" }, { "name": "CVE-2021-39921", "url": "https://www.cve.org/CVERecord?id=CVE-2021-39921" }, { "name": "CVE-2021-39925", "url": "https://www.cve.org/CVERecord?id=CVE-2021-39925" }, { "name": "CVE-2021-39920", "url": "https://www.cve.org/CVERecord?id=CVE-2021-39920" }, { "name": "CVE-2021-39929", "url": "https://www.cve.org/CVERecord?id=CVE-2021-39929" } ], "initial_release_date": "2021-11-18T00:00:00", "last_revision_date": "2021-11-18T00:00:00", "links": [], "reference": "CERTFR-2021-AVI-882", "revisions": [ { "description": "Version initiale", "revision_date": "2021-11-18T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Wireshark. Elles\npermettent \u00e0 un attaquant de provoquer un d\u00e9ni de service.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans Wireshark", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2021-07 du 17 novembre 2021", "url": "https://www.wireshark.org/security/wnpa-sec-2021-07.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2021-15 du 17 novembre 2021", "url": "https://www.wireshark.org/security/wnpa-sec-2021-15.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2021-14 du 17 novembre 2021", "url": "https://www.wireshark.org/security/wnpa-sec-2021-14.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2021-13 du 17 novembre 2021", "url": "https://www.wireshark.org/security/wnpa-sec-2021-13.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2021-10 du 17 novembre 2021", "url": "https://www.wireshark.org/security/wnpa-sec-2021-10.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2021-09 du 17 novembre 2021", "url": "https://www.wireshark.org/security/wnpa-sec-2021-09.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2021-11 du 17 novembre 2021", "url": "https://www.wireshark.org/security/wnpa-sec-2021-11.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2021-08 du 17 novembre 2021", "url": "https://www.wireshark.org/security/wnpa-sec-2021-08.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2021-12 du 17 novembre 2021", "url": "https://www.wireshark.org/security/wnpa-sec-2021-12.html" } ] }
CERTFR-2021-AVI-541
Vulnerability from certfr_avis
Une vulnérabilité a été découverte dans Wireshark. Elle permet à un attaquant de provoquer un déni de service.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneTitle | Publication Time | Tags | |||
---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Wireshark versions 3.4.x ant\u00e9rieures \u00e0 3.4.7", "product": { "name": "Wireshark", "vendor": { "name": "Wireshark", "scada": false } } }, { "description": "Wireshark versions 3.2.x ant\u00e9rieures \u00e0 3.2.15", "product": { "name": "Wireshark", "vendor": { "name": "Wireshark", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2021-22235", "url": "https://www.cve.org/CVERecord?id=CVE-2021-22235" } ], "initial_release_date": "2021-07-19T00:00:00", "last_revision_date": "2021-07-19T00:00:00", "links": [], "reference": "CERTFR-2021-AVI-541", "revisions": [ { "description": "Version initiale", "revision_date": "2021-07-19T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service" } ], "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans Wireshark. Elle permet \u00e0 un\nattaquant de provoquer un d\u00e9ni de service.\n", "title": "Vuln\u00e9rabilit\u00e9 dans Wireshark", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2021-06 du 14 juillet 2021", "url": "https://www.wireshark.org/security/wnpa-sec-2021-06.html" } ] }
CERTFR-2021-AVI-309
Vulnerability from certfr_avis
Une vulnérabilité a été découverte dans Wireshark. Elle permet à un attaquant de provoquer un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneTitle | Publication Time | Tags | |
---|---|---|---|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Wireshark versions 3.2.x ant\u00e9rieures \u00e0 3.2.13", "product": { "name": "Wireshark", "vendor": { "name": "Wireshark", "scada": false } } }, { "description": "Wireshark versions 3.4.x ant\u00e9rieures \u00e0 3.4.5", "product": { "name": "Wireshark", "vendor": { "name": "Wireshark", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2021-22207", "url": "https://www.cve.org/CVERecord?id=CVE-2021-22207" } ], "initial_release_date": "2021-04-23T00:00:00", "last_revision_date": "2021-04-23T00:00:00", "links": [ { "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2021-04 du 23 avril 2021", "url": "https://www.wireshark.org/security/wnpa-sec-2021-04.html" } ], "reference": "CERTFR-2021-AVI-309", "revisions": [ { "description": "Version initiale", "revision_date": "2021-04-23T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" } ], "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans Wireshark. Elle permet \u00e0 un\nattaquant de provoquer un d\u00e9ni de service \u00e0 distance.\n", "title": "Vuln\u00e9rabilit\u00e9 dans Wireshark", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2021-04 du 23 avril 2021", "url": null } ] }
CERTFR-2021-AVI-186
Vulnerability from certfr_avis
Une vulnérabilité a été découverte dans Wireshark. Elle permet à un attaquant de provoquer une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneTitle | Publication Time | Tags | |||
---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Wireshark versions 3.4.x ant\u00e9rieures \u00e0 3.4.4", "product": { "name": "Wireshark", "vendor": { "name": "Wireshark", "scada": false } } }, { "description": "Wireshark versions 3.2.x ant\u00e9rieures \u00e0 3.2.12", "product": { "name": "Wireshark", "vendor": { "name": "Wireshark", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2021-22191", "url": "https://www.cve.org/CVERecord?id=CVE-2021-22191" } ], "initial_release_date": "2021-03-11T00:00:00", "last_revision_date": "2021-03-11T00:00:00", "links": [], "reference": "CERTFR-2021-AVI-186", "revisions": [ { "description": "Version initiale", "revision_date": "2021-03-11T00:00:00.000000" } ], "risks": [ { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" } ], "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans Wireshark. Elle permet \u00e0 un\nattaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n", "title": "Vuln\u00e9rabilit\u00e9 dans Wireshark", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2021-03 du 10 mars 2021", "url": "https://www.wireshark.org/security/wnpa-sec-2021-03.html" } ] }
CERTFR-2021-AVI-069
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Wireshark. Elles permettent à un attaquant de provoquer un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneTitle | Publication Time | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Wireshark versions 3.4.x ant\u00e9rieures \u00e0 3.4.3", "product": { "name": "Wireshark", "vendor": { "name": "Wireshark", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [], "initial_release_date": "2021-02-01T00:00:00", "last_revision_date": "2021-02-01T00:00:00", "links": [], "reference": "CERTFR-2021-AVI-069", "revisions": [ { "description": "Version initiale", "revision_date": "2021-02-01T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Wireshark. Elles\npermettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans Wireshark", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2021-02 du 29 janvier 2021", "url": "https://www.wireshark.org/security/wnpa-sec-2021-02.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2021-01 du 29 janvier 2021", "url": "https://www.wireshark.org/security/wnpa-sec-2021-01.html" } ] }
CERTFR-2020-AVI-833
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Wireshark. Elles permettent à un attaquant de provoquer un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneTitle | Publication Time | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Wireshark versions 3.2.x ant\u00e9rieures \u00e0 3.2.9", "product": { "name": "Wireshark", "vendor": { "name": "Wireshark", "scada": false } } }, { "description": "Wireshark versions 3.4.x ant\u00e9rieures \u00e0 3.4.2", "product": { "name": "Wireshark", "vendor": { "name": "Wireshark", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2020-26421", "url": "https://www.cve.org/CVERecord?id=CVE-2020-26421" }, { "name": "CVE-2020-26420", "url": "https://www.cve.org/CVERecord?id=CVE-2020-26420" }, { "name": "CVE-2020-26418", "url": "https://www.cve.org/CVERecord?id=CVE-2020-26418" }, { "name": "CVE-2020-26419", "url": "https://www.cve.org/CVERecord?id=CVE-2020-26419" }, { "name": "CVE-2020-26422", "url": "https://www.cve.org/CVERecord?id=CVE-2020-26422" } ], "initial_release_date": "2020-12-21T00:00:00", "last_revision_date": "2020-12-21T00:00:00", "links": [], "reference": "CERTFR-2020-AVI-833", "revisions": [ { "description": "Version initiale", "revision_date": "2020-12-21T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Wireshark. Elles\npermettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans Wireshark", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2020-16 du 09 d\u00e9cembre 2020", "url": "https://www.wireshark.org/security/wnpa-sec-2020-16.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2020-20 du 18 d\u00e9cembre 2020", "url": "https://www.wireshark.org/security/wnpa-sec-2020-20.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2020-19 du 09 d\u00e9cembre 2020", "url": "https://www.wireshark.org/security/wnpa-sec-2020-19.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2020-17 du 09 d\u00e9cembre 2020", "url": "https://www.wireshark.org/security/wnpa-sec-2020-17.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2020-18 du 09 d\u00e9cembre 2020", "url": "https://www.wireshark.org/security/wnpa-sec-2020-18.html" } ] }