Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CERTFR-2014-AVI-502
Vulnerability from certfr_avis
De multiples vulnérabilités ont été corrigées dans les produits F5. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
De multiples produits sont impactés. Se référer au bulletin de l'éditeur pour la liste exhaustive des produits.
Impacted products
Vendor | Product | Description |
---|
References
Title | Publication Time | Tags | |||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [], "affected_systems_content": "\u003cP\u003eDe multiples produits sont impact\u00e9s. Se r\u00e9f\u00e9rer au bulletin de l\u0027\u00e9diteur pour la liste exhaustive des produits.\u003c/P\u003e", "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2011-3048", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3048" }, { "name": "CVE-2013-4921", "url": "https://www.cve.org/CVERecord?id=CVE-2013-4921" }, { "name": "CVE-2013-4935", "url": "https://www.cve.org/CVERecord?id=CVE-2013-4935" }, { "name": "CVE-2013-4920", "url": "https://www.cve.org/CVERecord?id=CVE-2013-4920" }, { "name": "CVE-2013-1944", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1944" }, { "name": "CVE-2013-4076", "url": "https://www.cve.org/CVERecord?id=CVE-2013-4076" }, { "name": "CVE-2013-4077", "url": "https://www.cve.org/CVERecord?id=CVE-2013-4077" }, { "name": "CVE-2013-4083", "url": "https://www.cve.org/CVERecord?id=CVE-2013-4083" }, { "name": "CVE-2013-4925", "url": "https://www.cve.org/CVERecord?id=CVE-2013-4925" }, { "name": "CVE-2013-4926", "url": "https://www.cve.org/CVERecord?id=CVE-2013-4926" }, { "name": "CVE-2013-4930", "url": "https://www.cve.org/CVERecord?id=CVE-2013-4930" }, { "name": "CVE-2013-4928", "url": "https://www.cve.org/CVERecord?id=CVE-2013-4928" }, { "name": "CVE-2010-0405", "url": "https://www.cve.org/CVERecord?id=CVE-2010-0405" }, { "name": "CVE-2013-4933", "url": "https://www.cve.org/CVERecord?id=CVE-2013-4933" }, { "name": "CVE-2013-4923", "url": "https://www.cve.org/CVERecord?id=CVE-2013-4923" }, { "name": "CVE-2013-4929", "url": "https://www.cve.org/CVERecord?id=CVE-2013-4929" }, { "name": "CVE-2013-4079", "url": "https://www.cve.org/CVERecord?id=CVE-2013-4079" }, { "name": "CVE-2013-4931", "url": "https://www.cve.org/CVERecord?id=CVE-2013-4931" }, { "name": "CVE-2013-4932", "url": "https://www.cve.org/CVERecord?id=CVE-2013-4932" }, { "name": "CVE-2013-4082", "url": "https://www.cve.org/CVERecord?id=CVE-2013-4082" }, { "name": "CVE-2013-4075", "url": "https://www.cve.org/CVERecord?id=CVE-2013-4075" }, { "name": "CVE-2013-4927", "url": "https://www.cve.org/CVERecord?id=CVE-2013-4927" }, { "name": "CVE-2013-4936", "url": "https://www.cve.org/CVERecord?id=CVE-2013-4936" }, { "name": "CVE-2013-4078", "url": "https://www.cve.org/CVERecord?id=CVE-2013-4078" }, { "name": "CVE-2013-1862", "url": "https://www.cve.org/CVERecord?id=CVE-2013-1862" }, { "name": "CVE-2013-4924", "url": "https://www.cve.org/CVERecord?id=CVE-2013-4924" }, { "name": "CVE-2011-1071", "url": "https://www.cve.org/CVERecord?id=CVE-2011-1071" }, { "name": "CVE-2013-4080", "url": "https://www.cve.org/CVERecord?id=CVE-2013-4080" }, { "name": "CVE-2013-4934", "url": "https://www.cve.org/CVERecord?id=CVE-2013-4934" }, { "name": "CVE-2013-4922", "url": "https://www.cve.org/CVERecord?id=CVE-2013-4922" }, { "name": "CVE-2013-4074", "url": "https://www.cve.org/CVERecord?id=CVE-2013-4074" }, { "name": "CVE-2012-2141", "url": "https://www.cve.org/CVERecord?id=CVE-2012-2141" }, { "name": "CVE-2013-4081", "url": "https://www.cve.org/CVERecord?id=CVE-2013-4081" } ], "initial_release_date": "2014-11-28T00:00:00", "last_revision_date": "2014-11-28T00:00:00", "links": [], "reference": "CERTFR-2014-AVI-502", "revisions": [ { "description": "version initiale.", "revision_date": "2014-11-28T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans les produits \u003cspan\nclass=\"textit\"\u003eF5\u003c/span\u003e. Elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0\ndistance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits F5", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 F5 SOL15883 du 27 novembre 2014", "url": "https://support.f5.com/kb/en-us/solutions/public/15000/800/sol15883.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 F5 SOL15881 du 27 novembre 2014", "url": "https://support.f5.com/kb/en-us/solutions/public/15000/800/sol15881.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 F5 SOL15878 du 26 novembre 2014", "url": "https://support.f5.com/kb/en-us/solutions/public/15000/800/sol15877.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 F5 SOL15877 du 27 novembre 2014", "url": "https://support.f5.com/kb/en-us/solutions/public/15000/800/sol15877.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 F5 SOL15885 du 27 novembre 2014", "url": "https://support.f5.com/kb/en-us/solutions/public/15000/800/sol15885.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 F5 SOL15868 du 27 novembre 2014", "url": "https://support.f5.com/kb/en-us/solutions/public/15000/800/sol15868.html" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 F5 SOL15875 du 27 novembre 2014", "url": "https://support.f5.com/kb/en-us/solutions/public/15000/800/sol15875.html" } ] }
CVE-2013-4920 (GCVE-0-2013-4920)
Vulnerability from cvelistv5
Published
2013-07-29 19:00
Modified
2024-08-06 16:59
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The P1 dissector in Wireshark 1.10.x before 1.10.1 does not properly initialize a global variable, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
References
URL | Tags | |||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:59:41.024Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8826" }, { "name": "54425", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/54425" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.wireshark.org/security/wnpa-sec-2013-42.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.10.1.html" }, { "name": "GLSA-201308-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml" }, { "name": "oval:org.mitre.oval:def:17089", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17089" }, { "name": "54296", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/54296" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=50083" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-07-26T00:00:00", "descriptions": [ { "lang": "en", "value": "The P1 dissector in Wireshark 1.10.x before 1.10.1 does not properly initialize a global variable, which allows remote attackers to cause a denial of service (application crash) via a crafted packet." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8826" }, { "name": "54425", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/54425" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.wireshark.org/security/wnpa-sec-2013-42.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.10.1.html" }, { "name": "GLSA-201308-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml" }, { "name": "oval:org.mitre.oval:def:17089", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17089" }, { "name": "54296", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/54296" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=50083" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2013-4920", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The P1 dissector in Wireshark 1.10.x before 1.10.1 does not properly initialize a global variable, which allows remote attackers to cause a denial of service (application crash) via a crafted packet." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8826", "refsource": "CONFIRM", "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8826" }, { "name": "54425", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/54425" }, { "name": "https://www.wireshark.org/security/wnpa-sec-2013-42.html", "refsource": "CONFIRM", "url": "https://www.wireshark.org/security/wnpa-sec-2013-42.html" }, { "name": "http://www.wireshark.org/docs/relnotes/wireshark-1.10.1.html", "refsource": "CONFIRM", "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.10.1.html" }, { "name": "GLSA-201308-05", "refsource": "GENTOO", "url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml" }, { "name": "oval:org.mitre.oval:def:17089", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17089" }, { "name": "54296", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/54296" }, { "name": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=50083", "refsource": "CONFIRM", "url": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=50083" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2013-4920", "datePublished": "2013-07-29T19:00:00", "dateReserved": "2013-07-26T00:00:00", "dateUpdated": "2024-08-06T16:59:41.024Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2013-4924 (GCVE-0-2013-4924)
Vulnerability from cvelistv5
Published
2013-07-29 19:00
Modified
2024-08-06 16:59
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
epan/dissectors/packet-dcom-sysact.c in the DCOM ISystemActivator dissector in Wireshark 1.10.x before 1.10.1 does not properly validate certain index values, which allows remote attackers to cause a denial of service (assertion failure and application exit) via a crafted packet.
References
URL | Tags | ||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:59:41.014Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8828" }, { "name": "54425", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/54425" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.10.1.html" }, { "name": "oval:org.mitre.oval:def:17701", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17701" }, { "name": "GLSA-201308-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-dcom-sysact.c?r1=50432\u0026r2=50431\u0026pathrev=50432" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.wireshark.org/security/wnpa-sec-2013-44.html" }, { "name": "54296", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/54296" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=50432" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-07-26T00:00:00", "descriptions": [ { "lang": "en", "value": "epan/dissectors/packet-dcom-sysact.c in the DCOM ISystemActivator dissector in Wireshark 1.10.x before 1.10.1 does not properly validate certain index values, which allows remote attackers to cause a denial of service (assertion failure and application exit) via a crafted packet." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8828" }, { "name": "54425", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/54425" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.10.1.html" }, { "name": "oval:org.mitre.oval:def:17701", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17701" }, { "name": "GLSA-201308-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-dcom-sysact.c?r1=50432\u0026r2=50431\u0026pathrev=50432" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.wireshark.org/security/wnpa-sec-2013-44.html" }, { "name": "54296", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/54296" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=50432" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2013-4924", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "epan/dissectors/packet-dcom-sysact.c in the DCOM ISystemActivator dissector in Wireshark 1.10.x before 1.10.1 does not properly validate certain index values, which allows remote attackers to cause a denial of service (assertion failure and application exit) via a crafted packet." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8828", "refsource": "CONFIRM", "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8828" }, { "name": "54425", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/54425" }, { "name": "http://www.wireshark.org/docs/relnotes/wireshark-1.10.1.html", "refsource": "CONFIRM", "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.10.1.html" }, { "name": "oval:org.mitre.oval:def:17701", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17701" }, { "name": "GLSA-201308-05", "refsource": "GENTOO", "url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml" }, { "name": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-dcom-sysact.c?r1=50432\u0026r2=50431\u0026pathrev=50432", "refsource": "CONFIRM", "url": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-dcom-sysact.c?r1=50432\u0026r2=50431\u0026pathrev=50432" }, { "name": "https://www.wireshark.org/security/wnpa-sec-2013-44.html", "refsource": "CONFIRM", "url": "https://www.wireshark.org/security/wnpa-sec-2013-44.html" }, { "name": "54296", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/54296" }, { "name": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=50432", "refsource": "CONFIRM", "url": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=50432" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2013-4924", "datePublished": "2013-07-29T19:00:00", "dateReserved": "2013-07-26T00:00:00", "dateUpdated": "2024-08-06T16:59:41.014Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2013-4928 (GCVE-0-2013-4928)
Vulnerability from cvelistv5
Published
2013-07-29 19:00
Modified
2024-08-06 16:59
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Integer signedness error in the dissect_headers function in epan/dissectors/packet-btobex.c in the Bluetooth OBEX dissector in Wireshark 1.10.x before 1.10.1 allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
References
URL | Tags | ||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:59:40.998Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "54425", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/54425" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8875" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.10.1.html" }, { "name": "GLSA-201308-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.wireshark.org/security/wnpa-sec-2013-46.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=50258" }, { "name": "54296", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/54296" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-btobex.c?r1=50258\u0026r2=50257\u0026pathrev=50258" }, { "name": "oval:org.mitre.oval:def:17540", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17540" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-07-26T00:00:00", "descriptions": [ { "lang": "en", "value": "Integer signedness error in the dissect_headers function in epan/dissectors/packet-btobex.c in the Bluetooth OBEX dissector in Wireshark 1.10.x before 1.10.1 allows remote attackers to cause a denial of service (infinite loop) via a crafted packet." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "54425", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/54425" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8875" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.10.1.html" }, { "name": "GLSA-201308-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.wireshark.org/security/wnpa-sec-2013-46.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=50258" }, { "name": "54296", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/54296" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-btobex.c?r1=50258\u0026r2=50257\u0026pathrev=50258" }, { "name": "oval:org.mitre.oval:def:17540", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17540" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2013-4928", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Integer signedness error in the dissect_headers function in epan/dissectors/packet-btobex.c in the Bluetooth OBEX dissector in Wireshark 1.10.x before 1.10.1 allows remote attackers to cause a denial of service (infinite loop) via a crafted packet." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "54425", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/54425" }, { "name": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8875", "refsource": "CONFIRM", "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8875" }, { "name": "http://www.wireshark.org/docs/relnotes/wireshark-1.10.1.html", "refsource": "CONFIRM", "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.10.1.html" }, { "name": "GLSA-201308-05", "refsource": "GENTOO", "url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml" }, { "name": "https://www.wireshark.org/security/wnpa-sec-2013-46.html", "refsource": "CONFIRM", "url": "https://www.wireshark.org/security/wnpa-sec-2013-46.html" }, { "name": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=50258", "refsource": "CONFIRM", "url": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=50258" }, { "name": "54296", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/54296" }, { "name": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-btobex.c?r1=50258\u0026r2=50257\u0026pathrev=50258", "refsource": "CONFIRM", "url": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-btobex.c?r1=50258\u0026r2=50257\u0026pathrev=50258" }, { "name": "oval:org.mitre.oval:def:17540", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17540" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2013-4928", "datePublished": "2013-07-29T19:00:00", "dateReserved": "2013-07-26T00:00:00", "dateUpdated": "2024-08-06T16:59:40.998Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2013-4930 (GCVE-0-2013-4930)
Vulnerability from cvelistv5
Published
2013-07-29 19:00
Modified
2024-08-06 16:59
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The dissect_dvbci_tpdu_hdr function in epan/dissectors/packet-dvbci.c in the DVB-CI dissector in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not validate a certain length value before decrementing it, which allows remote attackers to cause a denial of service (assertion failure and application exit) via a crafted packet.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:59:40.963Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "54371", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/54371" }, { "name": "openSUSE-SU-2013:1300", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00009.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.wireshark.org/security/wnpa-sec-2013-48.html" }, { "name": "54178", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/54178" }, { "name": "54425", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/54425" }, { "name": "DSA-2734", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2013/dsa-2734" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.10.1.html" }, { "name": "GLSA-201308-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8916" }, { "name": "oval:org.mitre.oval:def:16929", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16929" }, { "name": "openSUSE-SU-2013:1295", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00004.html" }, { "name": "54296", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/54296" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=50474" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-dvbci.c?r1=50474\u0026r2=50473\u0026pathrev=50474" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.8.9.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-07-26T00:00:00", "descriptions": [ { "lang": "en", "value": "The dissect_dvbci_tpdu_hdr function in epan/dissectors/packet-dvbci.c in the DVB-CI dissector in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not validate a certain length value before decrementing it, which allows remote attackers to cause a denial of service (assertion failure and application exit) via a crafted packet." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "54371", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/54371" }, { "name": "openSUSE-SU-2013:1300", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00009.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.wireshark.org/security/wnpa-sec-2013-48.html" }, { "name": "54178", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/54178" }, { "name": "54425", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/54425" }, { "name": "DSA-2734", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2013/dsa-2734" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.10.1.html" }, { "name": "GLSA-201308-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8916" }, { "name": "oval:org.mitre.oval:def:16929", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16929" }, { "name": "openSUSE-SU-2013:1295", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00004.html" }, { "name": "54296", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/54296" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=50474" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-dvbci.c?r1=50474\u0026r2=50473\u0026pathrev=50474" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.8.9.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2013-4930", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The dissect_dvbci_tpdu_hdr function in epan/dissectors/packet-dvbci.c in the DVB-CI dissector in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not validate a certain length value before decrementing it, which allows remote attackers to cause a denial of service (assertion failure and application exit) via a crafted packet." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "54371", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/54371" }, { "name": "openSUSE-SU-2013:1300", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00009.html" }, { "name": "https://www.wireshark.org/security/wnpa-sec-2013-48.html", "refsource": "CONFIRM", "url": "https://www.wireshark.org/security/wnpa-sec-2013-48.html" }, { "name": "54178", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/54178" }, { "name": "54425", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/54425" }, { "name": "DSA-2734", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2013/dsa-2734" }, { "name": "http://www.wireshark.org/docs/relnotes/wireshark-1.10.1.html", "refsource": "CONFIRM", "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.10.1.html" }, { "name": "GLSA-201308-05", "refsource": "GENTOO", "url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml" }, { "name": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8916", "refsource": "CONFIRM", "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8916" }, { "name": "oval:org.mitre.oval:def:16929", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16929" }, { "name": "openSUSE-SU-2013:1295", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00004.html" }, { "name": "54296", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/54296" }, { "name": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=50474", "refsource": "CONFIRM", "url": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=50474" }, { "name": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-dvbci.c?r1=50474\u0026r2=50473\u0026pathrev=50474", "refsource": "CONFIRM", "url": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-dvbci.c?r1=50474\u0026r2=50473\u0026pathrev=50474" }, { "name": "http://www.wireshark.org/docs/relnotes/wireshark-1.8.9.html", "refsource": "CONFIRM", "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.8.9.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2013-4930", "datePublished": "2013-07-29T19:00:00", "dateReserved": "2013-07-26T00:00:00", "dateUpdated": "2024-08-06T16:59:40.963Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2013-4921 (GCVE-0-2013-4921)
Vulnerability from cvelistv5
Published
2013-07-29 19:00
Modified
2024-08-06 16:59
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Off-by-one error in the dissect_radiotap function in epan/dissectors/packet-ieee80211-radiotap.c in the Radiotap dissector in Wireshark 1.10.x before 1.10.1 allows remote attackers to cause a denial of service (application crash) via a crafted packet.
References
URL | Tags | ||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:59:40.939Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "oval:org.mitre.oval:def:17514", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17514" }, { "name": "54425", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/54425" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-ieee80211-radiotap.c?r1=50090\u0026r2=50089\u0026pathrev=50090" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.wireshark.org/security/wnpa-sec-2013-43.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.10.1.html" }, { "name": "GLSA-201308-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8830" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=50090" }, { "name": "54296", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/54296" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-07-26T00:00:00", "descriptions": [ { "lang": "en", "value": "Off-by-one error in the dissect_radiotap function in epan/dissectors/packet-ieee80211-radiotap.c in the Radiotap dissector in Wireshark 1.10.x before 1.10.1 allows remote attackers to cause a denial of service (application crash) via a crafted packet." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "oval:org.mitre.oval:def:17514", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17514" }, { "name": "54425", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/54425" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-ieee80211-radiotap.c?r1=50090\u0026r2=50089\u0026pathrev=50090" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.wireshark.org/security/wnpa-sec-2013-43.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.10.1.html" }, { "name": "GLSA-201308-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8830" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=50090" }, { "name": "54296", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/54296" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2013-4921", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Off-by-one error in the dissect_radiotap function in epan/dissectors/packet-ieee80211-radiotap.c in the Radiotap dissector in Wireshark 1.10.x before 1.10.1 allows remote attackers to cause a denial of service (application crash) via a crafted packet." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "oval:org.mitre.oval:def:17514", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17514" }, { "name": "54425", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/54425" }, { "name": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-ieee80211-radiotap.c?r1=50090\u0026r2=50089\u0026pathrev=50090", "refsource": "CONFIRM", "url": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-ieee80211-radiotap.c?r1=50090\u0026r2=50089\u0026pathrev=50090" }, { "name": "https://www.wireshark.org/security/wnpa-sec-2013-43.html", "refsource": "CONFIRM", "url": "https://www.wireshark.org/security/wnpa-sec-2013-43.html" }, { "name": "http://www.wireshark.org/docs/relnotes/wireshark-1.10.1.html", "refsource": "CONFIRM", "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.10.1.html" }, { "name": "GLSA-201308-05", "refsource": "GENTOO", "url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml" }, { "name": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8830", "refsource": "CONFIRM", "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8830" }, { "name": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=50090", "refsource": "CONFIRM", "url": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=50090" }, { "name": "54296", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/54296" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2013-4921", "datePublished": "2013-07-29T19:00:00", "dateReserved": "2013-07-26T00:00:00", "dateUpdated": "2024-08-06T16:59:40.939Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2013-4933 (GCVE-0-2013-4933)
Vulnerability from cvelistv5
Published
2013-07-29 19:00
Modified
2024-08-06 16:59
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The netmon_open function in wiretap/netmon.c in the Netmon file parser in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not properly allocate memory, which allows remote attackers to cause a denial of service (application crash) via a crafted packet-trace file.
References
URL | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:59:41.038Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "54371", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/54371" }, { "name": "openSUSE-SU-2013:1300", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00009.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=49673" }, { "name": "oval:org.mitre.oval:def:17412", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17412" }, { "name": "54178", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/54178" }, { "name": "RHSA-2014:0341", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0341.html" }, { "name": "54425", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/54425" }, { "name": "DSA-2734", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2013/dsa-2734" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.10.1.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.wireshark.org/security/wnpa-sec-2013-51.html" }, { "name": "GLSA-201308-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml" }, { "name": "openSUSE-SU-2013:1295", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00004.html" }, { "name": "54296", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/54296" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8742" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://anonsvn.wireshark.org/viewvc/trunk/wiretap/netmon.c?r1=49673\u0026r2=49672\u0026pathrev=49673" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.8.9.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-07-26T00:00:00", "descriptions": [ { "lang": "en", "value": "The netmon_open function in wiretap/netmon.c in the Netmon file parser in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not properly allocate memory, which allows remote attackers to cause a denial of service (application crash) via a crafted packet-trace file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "54371", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/54371" }, { "name": "openSUSE-SU-2013:1300", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00009.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=49673" }, { "name": "oval:org.mitre.oval:def:17412", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17412" }, { "name": "54178", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/54178" }, { "name": "RHSA-2014:0341", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0341.html" }, { "name": "54425", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/54425" }, { "name": "DSA-2734", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2013/dsa-2734" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.10.1.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.wireshark.org/security/wnpa-sec-2013-51.html" }, { "name": "GLSA-201308-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml" }, { "name": "openSUSE-SU-2013:1295", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00004.html" }, { "name": "54296", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/54296" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8742" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://anonsvn.wireshark.org/viewvc/trunk/wiretap/netmon.c?r1=49673\u0026r2=49672\u0026pathrev=49673" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.8.9.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2013-4933", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The netmon_open function in wiretap/netmon.c in the Netmon file parser in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not properly allocate memory, which allows remote attackers to cause a denial of service (application crash) via a crafted packet-trace file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "54371", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/54371" }, { "name": "openSUSE-SU-2013:1300", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00009.html" }, { "name": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=49673", "refsource": "CONFIRM", "url": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=49673" }, { "name": "oval:org.mitre.oval:def:17412", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17412" }, { "name": "54178", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/54178" }, { "name": "RHSA-2014:0341", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-0341.html" }, { "name": "54425", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/54425" }, { "name": "DSA-2734", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2013/dsa-2734" }, { "name": "http://www.wireshark.org/docs/relnotes/wireshark-1.10.1.html", "refsource": "CONFIRM", "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.10.1.html" }, { "name": "https://www.wireshark.org/security/wnpa-sec-2013-51.html", "refsource": "CONFIRM", "url": "https://www.wireshark.org/security/wnpa-sec-2013-51.html" }, { "name": "GLSA-201308-05", "refsource": "GENTOO", "url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml" }, { "name": "openSUSE-SU-2013:1295", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00004.html" }, { "name": "54296", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/54296" }, { "name": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8742", "refsource": "CONFIRM", "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8742" }, { "name": "http://anonsvn.wireshark.org/viewvc/trunk/wiretap/netmon.c?r1=49673\u0026r2=49672\u0026pathrev=49673", "refsource": "CONFIRM", "url": "http://anonsvn.wireshark.org/viewvc/trunk/wiretap/netmon.c?r1=49673\u0026r2=49672\u0026pathrev=49673" }, { "name": "http://www.wireshark.org/docs/relnotes/wireshark-1.8.9.html", "refsource": "CONFIRM", "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.8.9.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2013-4933", "datePublished": "2013-07-29T19:00:00", "dateReserved": "2013-07-26T00:00:00", "dateUpdated": "2024-08-06T16:59:41.038Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2012-2141 (GCVE-0-2012-2141)
Vulnerability from cvelistv5
Published
2012-08-14 22:00
Modified
2024-08-06 19:26
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Array index error in the handle_nsExtendOutput2Table function in agent/mibgroup/agent/extend.c in Net-SNMP 5.7.1 allows remote authenticated users to cause a denial of service (out-of-bounds read and snmpd crash) via an SNMP GET request for an entry not in the extension table.
References
URL | Tags | |||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T19:26:08.518Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[oss-security] 20120426 Re: CVE Request -- net-snmp: Array index error, leading to out-of heap-based buffer read (snmpd crash)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2012/04/26/3" }, { "name": "RHSA-2013:0124", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-0124.html" }, { "name": "netsnmp-snmpget-dos(75169)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75169" }, { "name": "1026984", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1026984" }, { "name": "59974", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/59974" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.citrix.com/article/CTX139049" }, { "name": "[oss-security] 20120426 CVE Request -- net-snmp: Array index error, leading to out-of heap-based buffer read (snmpd crash)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2012/04/26/2" }, { "name": "GLSA-201409-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-201409-02.xml" }, { "name": "53258", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/53258" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=815813" }, { "name": "53255", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/53255" }, { "name": "48938", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/48938" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-04-24T00:00:00", "descriptions": [ { "lang": "en", "value": "Array index error in the handle_nsExtendOutput2Table function in agent/mibgroup/agent/extend.c in Net-SNMP 5.7.1 allows remote authenticated users to cause a denial of service (out-of-bounds read and snmpd crash) via an SNMP GET request for an entry not in the extension table." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "[oss-security] 20120426 Re: CVE Request -- net-snmp: Array index error, leading to out-of heap-based buffer read (snmpd crash)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2012/04/26/3" }, { "name": "RHSA-2013:0124", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-0124.html" }, { "name": "netsnmp-snmpget-dos(75169)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75169" }, { "name": "1026984", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1026984" }, { "name": "59974", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/59974" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.citrix.com/article/CTX139049" }, { "name": "[oss-security] 20120426 CVE Request -- net-snmp: Array index error, leading to out-of heap-based buffer read (snmpd crash)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2012/04/26/2" }, { "name": "GLSA-201409-02", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-201409-02.xml" }, { "name": "53258", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/53258" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=815813" }, { "name": "53255", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/53255" }, { "name": "48938", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/48938" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2012-2141", "datePublished": "2012-08-14T22:00:00", "dateReserved": "2012-04-04T00:00:00", "dateUpdated": "2024-08-06T19:26:08.518Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2013-4929 (GCVE-0-2013-4929)
Vulnerability from cvelistv5
Published
2013-07-29 19:00
Modified
2024-08-06 16:59
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The parseFields function in epan/dissectors/packet-dis-pdus.c in the DIS dissector in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not terminate packet-data processing after finding zero remaining bytes, which allows remote attackers to cause a denial of service (loop) via a crafted packet.
References
URL | Tags | ||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:59:41.001Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "54371", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/54371" }, { "name": "openSUSE-SU-2013:1300", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00009.html" }, { "name": "54425", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/54425" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.10.1.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=50450" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-dis-pdus.c?r1=50450\u0026r2=50449\u0026pathrev=50450" }, { "name": "GLSA-201308-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml" }, { "name": "oval:org.mitre.oval:def:17028", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17028" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8911" }, { "name": "openSUSE-SU-2013:1295", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00004.html" }, { "name": "54296", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/54296" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.wireshark.org/security/wnpa-sec-2013-47.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.8.9.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-07-26T00:00:00", "descriptions": [ { "lang": "en", "value": "The parseFields function in epan/dissectors/packet-dis-pdus.c in the DIS dissector in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not terminate packet-data processing after finding zero remaining bytes, which allows remote attackers to cause a denial of service (loop) via a crafted packet." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "54371", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/54371" }, { "name": "openSUSE-SU-2013:1300", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00009.html" }, { "name": "54425", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/54425" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.10.1.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=50450" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-dis-pdus.c?r1=50450\u0026r2=50449\u0026pathrev=50450" }, { "name": "GLSA-201308-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml" }, { "name": "oval:org.mitre.oval:def:17028", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17028" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8911" }, { "name": "openSUSE-SU-2013:1295", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00004.html" }, { "name": "54296", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/54296" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.wireshark.org/security/wnpa-sec-2013-47.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.8.9.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2013-4929", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The parseFields function in epan/dissectors/packet-dis-pdus.c in the DIS dissector in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not terminate packet-data processing after finding zero remaining bytes, which allows remote attackers to cause a denial of service (loop) via a crafted packet." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "54371", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/54371" }, { "name": "openSUSE-SU-2013:1300", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00009.html" }, { "name": "54425", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/54425" }, { "name": "http://www.wireshark.org/docs/relnotes/wireshark-1.10.1.html", "refsource": "CONFIRM", "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.10.1.html" }, { "name": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=50450", "refsource": "CONFIRM", "url": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=50450" }, { "name": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-dis-pdus.c?r1=50450\u0026r2=50449\u0026pathrev=50450", "refsource": "CONFIRM", "url": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-dis-pdus.c?r1=50450\u0026r2=50449\u0026pathrev=50450" }, { "name": "GLSA-201308-05", "refsource": "GENTOO", "url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml" }, { "name": "oval:org.mitre.oval:def:17028", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17028" }, { "name": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8911", "refsource": "CONFIRM", "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8911" }, { "name": "openSUSE-SU-2013:1295", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00004.html" }, { "name": "54296", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/54296" }, { "name": "https://www.wireshark.org/security/wnpa-sec-2013-47.html", "refsource": "CONFIRM", "url": "https://www.wireshark.org/security/wnpa-sec-2013-47.html" }, { "name": "http://www.wireshark.org/docs/relnotes/wireshark-1.8.9.html", "refsource": "CONFIRM", "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.8.9.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2013-4929", "datePublished": "2013-07-29T19:00:00", "dateReserved": "2013-07-26T00:00:00", "dateUpdated": "2024-08-06T16:59:41.001Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2013-4074 (GCVE-0-2013-4074)
Vulnerability from cvelistv5
Published
2013-06-09 21:00
Modified
2024-08-06 16:30
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The dissect_capwap_data function in epan/dissectors/packet-capwap.c in the CAPWAP dissector in Wireshark 1.6.x before 1.6.16 and 1.8.x before 1.8.8 incorrectly uses a -1 data value to represent an error condition, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
References
URL | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:30:49.897Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "33556", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "http://www.exploit-db.com/exploits/33556" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.8.8.html" }, { "name": "53762", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/53762" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.wireshark.org/security/wnpa-sec-2013-32.html" }, { "name": "54425", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/54425" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=43716" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/126848/Wireshark-CAPWAP-Dissector-Denial-Of-Service.html" }, { "name": "GLSA-201308-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml" }, { "name": "openSUSE-SU-2013:1086", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00196.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.6.16.html" }, { "name": "DSA-2709", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2013/dsa-2709" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8725" }, { "name": "94091", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/show/osvdb/94091" }, { "name": "oval:org.mitre.oval:def:16698", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16698" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-capwap.c?r1=43716\u0026r2=43715\u0026pathrev=43716" }, { "name": "MDVSA-2013:172", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:172" }, { "name": "openSUSE-SU-2013:1084", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00194.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-06-07T00:00:00", "descriptions": [ { "lang": "en", "value": "The dissect_capwap_data function in epan/dissectors/packet-capwap.c in the CAPWAP dissector in Wireshark 1.6.x before 1.6.16 and 1.8.x before 1.8.8 incorrectly uses a -1 data value to represent an error condition, which allows remote attackers to cause a denial of service (application crash) via a crafted packet." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "33556", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "http://www.exploit-db.com/exploits/33556" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.8.8.html" }, { "name": "53762", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/53762" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.wireshark.org/security/wnpa-sec-2013-32.html" }, { "name": "54425", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/54425" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=43716" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/126848/Wireshark-CAPWAP-Dissector-Denial-Of-Service.html" }, { "name": "GLSA-201308-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml" }, { "name": "openSUSE-SU-2013:1086", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00196.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.6.16.html" }, { "name": "DSA-2709", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2013/dsa-2709" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8725" }, { "name": "94091", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/show/osvdb/94091" }, { "name": "oval:org.mitre.oval:def:16698", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16698" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-capwap.c?r1=43716\u0026r2=43715\u0026pathrev=43716" }, { "name": "MDVSA-2013:172", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:172" }, { "name": "openSUSE-SU-2013:1084", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00194.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2013-4074", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The dissect_capwap_data function in epan/dissectors/packet-capwap.c in the CAPWAP dissector in Wireshark 1.6.x before 1.6.16 and 1.8.x before 1.8.8 incorrectly uses a -1 data value to represent an error condition, which allows remote attackers to cause a denial of service (application crash) via a crafted packet." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "33556", "refsource": "EXPLOIT-DB", "url": "http://www.exploit-db.com/exploits/33556" }, { "name": "http://www.wireshark.org/docs/relnotes/wireshark-1.8.8.html", "refsource": "CONFIRM", "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.8.8.html" }, { "name": "53762", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/53762" }, { "name": "http://www.wireshark.org/security/wnpa-sec-2013-32.html", "refsource": "CONFIRM", "url": "http://www.wireshark.org/security/wnpa-sec-2013-32.html" }, { "name": "54425", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/54425" }, { "name": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=43716", "refsource": "CONFIRM", "url": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=43716" }, { "name": "http://packetstormsecurity.com/files/126848/Wireshark-CAPWAP-Dissector-Denial-Of-Service.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/126848/Wireshark-CAPWAP-Dissector-Denial-Of-Service.html" }, { "name": "GLSA-201308-05", "refsource": "GENTOO", "url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml" }, { "name": "openSUSE-SU-2013:1086", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00196.html" }, { "name": "http://www.wireshark.org/docs/relnotes/wireshark-1.6.16.html", "refsource": "CONFIRM", "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.6.16.html" }, { "name": "DSA-2709", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2013/dsa-2709" }, { "name": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8725", "refsource": "CONFIRM", "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8725" }, { "name": "94091", "refsource": "OSVDB", "url": "http://osvdb.org/show/osvdb/94091" }, { "name": "oval:org.mitre.oval:def:16698", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16698" }, { "name": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-capwap.c?r1=43716\u0026r2=43715\u0026pathrev=43716", "refsource": "CONFIRM", "url": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-capwap.c?r1=43716\u0026r2=43715\u0026pathrev=43716" }, { "name": "MDVSA-2013:172", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:172" }, { "name": "openSUSE-SU-2013:1084", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00194.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2013-4074", "datePublished": "2013-06-09T21:00:00", "dateReserved": "2013-06-09T00:00:00", "dateUpdated": "2024-08-06T16:30:49.897Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2013-4932 (GCVE-0-2013-4932)
Vulnerability from cvelistv5
Published
2013-07-29 19:00
Modified
2024-08-06 16:59
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Multiple array index errors in epan/dissectors/packet-gsm_a_common.c in the GSM A Common dissector in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 allow remote attackers to cause a denial of service (application crash) via a crafted packet.
References
URL | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:59:40.823Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "54371", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/54371" }, { "name": "openSUSE-SU-2013:1300", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00009.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=50672" }, { "name": "54178", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/54178" }, { "name": "RHSA-2014:0341", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0341.html" }, { "name": "54425", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/54425" }, { "name": "DSA-2734", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2013/dsa-2734" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.10.1.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-gsm_a_common.c?r1=50672\u0026r2=50671\u0026pathrev=50672" }, { "name": "GLSA-201308-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml" }, { "name": "oval:org.mitre.oval:def:17260", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17260" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.wireshark.org/security/wnpa-sec-2013-50.html" }, { "name": "openSUSE-SU-2013:1295", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00004.html" }, { "name": "54296", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/54296" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.8.9.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8940" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-07-26T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple array index errors in epan/dissectors/packet-gsm_a_common.c in the GSM A Common dissector in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 allow remote attackers to cause a denial of service (application crash) via a crafted packet." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "54371", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/54371" }, { "name": "openSUSE-SU-2013:1300", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00009.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=50672" }, { "name": "54178", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/54178" }, { "name": "RHSA-2014:0341", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0341.html" }, { "name": "54425", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/54425" }, { "name": "DSA-2734", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2013/dsa-2734" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.10.1.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-gsm_a_common.c?r1=50672\u0026r2=50671\u0026pathrev=50672" }, { "name": "GLSA-201308-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml" }, { "name": "oval:org.mitre.oval:def:17260", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17260" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.wireshark.org/security/wnpa-sec-2013-50.html" }, { "name": "openSUSE-SU-2013:1295", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00004.html" }, { "name": "54296", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/54296" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.8.9.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8940" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2013-4932", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple array index errors in epan/dissectors/packet-gsm_a_common.c in the GSM A Common dissector in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 allow remote attackers to cause a denial of service (application crash) via a crafted packet." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "54371", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/54371" }, { "name": "openSUSE-SU-2013:1300", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00009.html" }, { "name": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=50672", "refsource": "CONFIRM", "url": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=50672" }, { "name": "54178", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/54178" }, { "name": "RHSA-2014:0341", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-0341.html" }, { "name": "54425", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/54425" }, { "name": "DSA-2734", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2013/dsa-2734" }, { "name": "http://www.wireshark.org/docs/relnotes/wireshark-1.10.1.html", "refsource": "CONFIRM", "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.10.1.html" }, { "name": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-gsm_a_common.c?r1=50672\u0026r2=50671\u0026pathrev=50672", "refsource": "CONFIRM", "url": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-gsm_a_common.c?r1=50672\u0026r2=50671\u0026pathrev=50672" }, { "name": "GLSA-201308-05", "refsource": "GENTOO", "url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml" }, { "name": "oval:org.mitre.oval:def:17260", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17260" }, { "name": "https://www.wireshark.org/security/wnpa-sec-2013-50.html", "refsource": "CONFIRM", "url": "https://www.wireshark.org/security/wnpa-sec-2013-50.html" }, { "name": "openSUSE-SU-2013:1295", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00004.html" }, { "name": "54296", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/54296" }, { "name": "http://www.wireshark.org/docs/relnotes/wireshark-1.8.9.html", "refsource": "CONFIRM", "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.8.9.html" }, { "name": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8940", "refsource": "CONFIRM", "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8940" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2013-4932", "datePublished": "2013-07-29T19:00:00", "dateReserved": "2013-07-26T00:00:00", "dateUpdated": "2024-08-06T16:59:40.823Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2013-4081 (GCVE-0-2013-4081)
Vulnerability from cvelistv5
Published
2013-06-09 21:00
Modified
2024-08-06 16:30
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The http_payload_subdissector function in epan/dissectors/packet-http.c in the HTTP dissector in Wireshark 1.6.x before 1.6.16 and 1.8.x before 1.8.8 does not properly determine when to use a recursive approach, which allows remote attackers to cause a denial of service (stack consumption) via a crafted packet.
References
URL | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:30:49.918Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.8.8.html" }, { "name": "53762", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/53762" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.wireshark.org/security/wnpa-sec-2013-39.html" }, { "name": "RHSA-2014:0341", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0341.html" }, { "name": "54425", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/54425" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-http.c?r1=49623\u0026r2=49622\u0026pathrev=49623" }, { "name": "oval:org.mitre.oval:def:16820", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16820" }, { "name": "GLSA-201308-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml" }, { "name": "60505", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/60505" }, { "name": "openSUSE-SU-2013:1086", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00196.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.6.16.html" }, { "name": "DSA-2709", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2013/dsa-2709" }, { "name": "MDVSA-2013:172", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:172" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8733" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=49623" }, { "name": "openSUSE-SU-2013:1084", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00194.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-06-07T00:00:00", "descriptions": [ { "lang": "en", "value": "The http_payload_subdissector function in epan/dissectors/packet-http.c in the HTTP dissector in Wireshark 1.6.x before 1.6.16 and 1.8.x before 1.8.8 does not properly determine when to use a recursive approach, which allows remote attackers to cause a denial of service (stack consumption) via a crafted packet." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.8.8.html" }, { "name": "53762", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/53762" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.wireshark.org/security/wnpa-sec-2013-39.html" }, { "name": "RHSA-2014:0341", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0341.html" }, { "name": "54425", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/54425" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-http.c?r1=49623\u0026r2=49622\u0026pathrev=49623" }, { "name": "oval:org.mitre.oval:def:16820", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16820" }, { "name": "GLSA-201308-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml" }, { "name": "60505", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/60505" }, { "name": "openSUSE-SU-2013:1086", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00196.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.6.16.html" }, { "name": "DSA-2709", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2013/dsa-2709" }, { "name": "MDVSA-2013:172", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:172" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8733" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=49623" }, { "name": "openSUSE-SU-2013:1084", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00194.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2013-4081", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The http_payload_subdissector function in epan/dissectors/packet-http.c in the HTTP dissector in Wireshark 1.6.x before 1.6.16 and 1.8.x before 1.8.8 does not properly determine when to use a recursive approach, which allows remote attackers to cause a denial of service (stack consumption) via a crafted packet." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.wireshark.org/docs/relnotes/wireshark-1.8.8.html", "refsource": "CONFIRM", "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.8.8.html" }, { "name": "53762", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/53762" }, { "name": "http://www.wireshark.org/security/wnpa-sec-2013-39.html", "refsource": "CONFIRM", "url": "http://www.wireshark.org/security/wnpa-sec-2013-39.html" }, { "name": "RHSA-2014:0341", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-0341.html" }, { "name": "54425", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/54425" }, { "name": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-http.c?r1=49623\u0026r2=49622\u0026pathrev=49623", "refsource": "CONFIRM", "url": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-http.c?r1=49623\u0026r2=49622\u0026pathrev=49623" }, { "name": "oval:org.mitre.oval:def:16820", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16820" }, { "name": "GLSA-201308-05", "refsource": "GENTOO", "url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml" }, { "name": "60505", "refsource": "BID", "url": "http://www.securityfocus.com/bid/60505" }, { "name": "openSUSE-SU-2013:1086", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00196.html" }, { "name": "http://www.wireshark.org/docs/relnotes/wireshark-1.6.16.html", "refsource": "CONFIRM", "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.6.16.html" }, { "name": "DSA-2709", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2013/dsa-2709" }, { "name": "MDVSA-2013:172", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:172" }, { "name": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8733", "refsource": "CONFIRM", "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8733" }, { "name": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=49623", "refsource": "CONFIRM", "url": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=49623" }, { "name": "openSUSE-SU-2013:1084", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00194.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2013-4081", "datePublished": "2013-06-09T21:00:00", "dateReserved": "2013-06-09T00:00:00", "dateUpdated": "2024-08-06T16:30:49.918Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2013-4077 (GCVE-0-2013-4077)
Vulnerability from cvelistv5
Published
2013-06-09 21:00
Modified
2024-08-06 16:30
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Array index error in the NBAP dissector in Wireshark 1.8.x before 1.8.8 allows remote attackers to cause a denial of service (application crash) via a crafted packet, related to nbap.cnf and packet-nbap.c.
References
URL | Tags | ||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:30:50.051Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.8.8.html" }, { "name": "53762", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/53762" }, { "name": "54425", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/54425" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8697" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.wireshark.org/security/wnpa-sec-2013-35.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=49418" }, { "name": "GLSA-201308-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml" }, { "name": "openSUSE-SU-2013:1086", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00196.html" }, { "name": "DSA-2709", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2013/dsa-2709" }, { "name": "oval:org.mitre.oval:def:16829", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16829" }, { "name": "openSUSE-SU-2013:1084", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00194.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-06-07T00:00:00", "descriptions": [ { "lang": "en", "value": "Array index error in the NBAP dissector in Wireshark 1.8.x before 1.8.8 allows remote attackers to cause a denial of service (application crash) via a crafted packet, related to nbap.cnf and packet-nbap.c." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.8.8.html" }, { "name": "53762", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/53762" }, { "name": "54425", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/54425" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8697" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.wireshark.org/security/wnpa-sec-2013-35.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=49418" }, { "name": "GLSA-201308-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml" }, { "name": "openSUSE-SU-2013:1086", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00196.html" }, { "name": "DSA-2709", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2013/dsa-2709" }, { "name": "oval:org.mitre.oval:def:16829", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16829" }, { "name": "openSUSE-SU-2013:1084", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00194.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2013-4077", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Array index error in the NBAP dissector in Wireshark 1.8.x before 1.8.8 allows remote attackers to cause a denial of service (application crash) via a crafted packet, related to nbap.cnf and packet-nbap.c." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.wireshark.org/docs/relnotes/wireshark-1.8.8.html", "refsource": "CONFIRM", "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.8.8.html" }, { "name": "53762", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/53762" }, { "name": "54425", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/54425" }, { "name": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8697", "refsource": "CONFIRM", "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8697" }, { "name": "http://www.wireshark.org/security/wnpa-sec-2013-35.html", "refsource": "CONFIRM", "url": "http://www.wireshark.org/security/wnpa-sec-2013-35.html" }, { "name": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=49418", "refsource": "CONFIRM", "url": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=49418" }, { "name": "GLSA-201308-05", "refsource": "GENTOO", "url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml" }, { "name": "openSUSE-SU-2013:1086", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00196.html" }, { "name": "DSA-2709", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2013/dsa-2709" }, { "name": "oval:org.mitre.oval:def:16829", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16829" }, { "name": "openSUSE-SU-2013:1084", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00194.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2013-4077", "datePublished": "2013-06-09T21:00:00", "dateReserved": "2013-06-09T00:00:00", "dateUpdated": "2024-08-06T16:30:50.051Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2013-4083 (GCVE-0-2013-4083)
Vulnerability from cvelistv5
Published
2013-06-09 21:00
Modified
2024-08-06 16:30
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The dissect_pft function in epan/dissectors/packet-dcp-etsi.c in the DCP ETSI dissector in Wireshark 1.6.x before 1.6.16, 1.8.x before 1.8.8, and 1.10.0 does not validate a certain fragment length value, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
References
URL | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:30:50.040Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8717" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.8.8.html" }, { "name": "53762", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/53762" }, { "name": "RHSA-2014:0341", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0341.html" }, { "name": "54425", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/54425" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.10.1.html" }, { "name": "GLSA-201308-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml" }, { "name": "openSUSE-SU-2013:1086", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00196.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.6.16.html" }, { "name": "DSA-2709", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2013/dsa-2709" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-dcp-etsi.c?r1=49802\u0026r2=49801\u0026pathrev=49802" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.wireshark.org/security/wnpa-sec-2013-41.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=49802" }, { "name": "54296", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/54296" }, { "name": "oval:org.mitre.oval:def:16375", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16375" }, { "name": "MDVSA-2013:172", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:172" }, { "name": "openSUSE-SU-2013:1084", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00194.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-06-07T00:00:00", "descriptions": [ { "lang": "en", "value": "The dissect_pft function in epan/dissectors/packet-dcp-etsi.c in the DCP ETSI dissector in Wireshark 1.6.x before 1.6.16, 1.8.x before 1.8.8, and 1.10.0 does not validate a certain fragment length value, which allows remote attackers to cause a denial of service (application crash) via a crafted packet." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8717" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.8.8.html" }, { "name": "53762", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/53762" }, { "name": "RHSA-2014:0341", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0341.html" }, { "name": "54425", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/54425" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.10.1.html" }, { "name": "GLSA-201308-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml" }, { "name": "openSUSE-SU-2013:1086", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00196.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.6.16.html" }, { "name": "DSA-2709", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2013/dsa-2709" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-dcp-etsi.c?r1=49802\u0026r2=49801\u0026pathrev=49802" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.wireshark.org/security/wnpa-sec-2013-41.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=49802" }, { "name": "54296", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/54296" }, { "name": "oval:org.mitre.oval:def:16375", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16375" }, { "name": "MDVSA-2013:172", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:172" }, { "name": "openSUSE-SU-2013:1084", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00194.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2013-4083", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The dissect_pft function in epan/dissectors/packet-dcp-etsi.c in the DCP ETSI dissector in Wireshark 1.6.x before 1.6.16, 1.8.x before 1.8.8, and 1.10.0 does not validate a certain fragment length value, which allows remote attackers to cause a denial of service (application crash) via a crafted packet." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8717", "refsource": "CONFIRM", "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8717" }, { "name": "http://www.wireshark.org/docs/relnotes/wireshark-1.8.8.html", "refsource": "CONFIRM", "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.8.8.html" }, { "name": "53762", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/53762" }, { "name": "RHSA-2014:0341", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-0341.html" }, { "name": "54425", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/54425" }, { "name": "http://www.wireshark.org/docs/relnotes/wireshark-1.10.1.html", "refsource": "CONFIRM", "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.10.1.html" }, { "name": "GLSA-201308-05", "refsource": "GENTOO", "url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml" }, { "name": "openSUSE-SU-2013:1086", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00196.html" }, { "name": "http://www.wireshark.org/docs/relnotes/wireshark-1.6.16.html", "refsource": "CONFIRM", "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.6.16.html" }, { "name": "DSA-2709", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2013/dsa-2709" }, { "name": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-dcp-etsi.c?r1=49802\u0026r2=49801\u0026pathrev=49802", "refsource": "CONFIRM", "url": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-dcp-etsi.c?r1=49802\u0026r2=49801\u0026pathrev=49802" }, { "name": "http://www.wireshark.org/security/wnpa-sec-2013-41.html", "refsource": "CONFIRM", "url": "http://www.wireshark.org/security/wnpa-sec-2013-41.html" }, { "name": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=49802", "refsource": "CONFIRM", "url": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=49802" }, { "name": "54296", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/54296" }, { "name": "oval:org.mitre.oval:def:16375", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16375" }, { "name": "MDVSA-2013:172", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:172" }, { "name": "openSUSE-SU-2013:1084", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00194.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2013-4083", "datePublished": "2013-06-09T21:00:00", "dateReserved": "2013-06-09T00:00:00", "dateUpdated": "2024-08-06T16:30:50.040Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2013-4934 (GCVE-0-2013-4934)
Vulnerability from cvelistv5
Published
2013-07-29 19:00
Modified
2024-08-06 16:59
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The netmon_open function in wiretap/netmon.c in the Netmon file parser in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not initialize certain structure members, which allows remote attackers to cause a denial of service (application crash) via a crafted packet-trace file.
References
URL | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:59:40.994Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://anonsvn.wireshark.org/viewvc/trunk/wiretap/netmon.c?r1=49697\u0026r2=49696\u0026pathrev=49697" }, { "name": "54371", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/54371" }, { "name": "openSUSE-SU-2013:1300", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00009.html" }, { "name": "54178", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/54178" }, { "name": "oval:org.mitre.oval:def:17584", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17584" }, { "name": "RHSA-2014:0341", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0341.html" }, { "name": "54425", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/54425" }, { "name": "DSA-2734", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2013/dsa-2734" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.10.1.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.wireshark.org/security/wnpa-sec-2013-51.html" }, { "name": "GLSA-201308-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=49697" }, { "name": "openSUSE-SU-2013:1295", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00004.html" }, { "name": "54296", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/54296" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8742" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.8.9.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-07-26T00:00:00", "descriptions": [ { "lang": "en", "value": "The netmon_open function in wiretap/netmon.c in the Netmon file parser in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not initialize certain structure members, which allows remote attackers to cause a denial of service (application crash) via a crafted packet-trace file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://anonsvn.wireshark.org/viewvc/trunk/wiretap/netmon.c?r1=49697\u0026r2=49696\u0026pathrev=49697" }, { "name": "54371", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/54371" }, { "name": "openSUSE-SU-2013:1300", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00009.html" }, { "name": "54178", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/54178" }, { "name": "oval:org.mitre.oval:def:17584", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17584" }, { "name": "RHSA-2014:0341", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0341.html" }, { "name": "54425", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/54425" }, { "name": "DSA-2734", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2013/dsa-2734" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.10.1.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.wireshark.org/security/wnpa-sec-2013-51.html" }, { "name": "GLSA-201308-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=49697" }, { "name": "openSUSE-SU-2013:1295", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00004.html" }, { "name": "54296", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/54296" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8742" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.8.9.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2013-4934", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The netmon_open function in wiretap/netmon.c in the Netmon file parser in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not initialize certain structure members, which allows remote attackers to cause a denial of service (application crash) via a crafted packet-trace file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://anonsvn.wireshark.org/viewvc/trunk/wiretap/netmon.c?r1=49697\u0026r2=49696\u0026pathrev=49697", "refsource": "CONFIRM", "url": "http://anonsvn.wireshark.org/viewvc/trunk/wiretap/netmon.c?r1=49697\u0026r2=49696\u0026pathrev=49697" }, { "name": "54371", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/54371" }, { "name": "openSUSE-SU-2013:1300", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00009.html" }, { "name": "54178", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/54178" }, { "name": "oval:org.mitre.oval:def:17584", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17584" }, { "name": "RHSA-2014:0341", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-0341.html" }, { "name": "54425", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/54425" }, { "name": "DSA-2734", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2013/dsa-2734" }, { "name": "http://www.wireshark.org/docs/relnotes/wireshark-1.10.1.html", "refsource": "CONFIRM", "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.10.1.html" }, { "name": "https://www.wireshark.org/security/wnpa-sec-2013-51.html", "refsource": "CONFIRM", "url": "https://www.wireshark.org/security/wnpa-sec-2013-51.html" }, { "name": "GLSA-201308-05", "refsource": "GENTOO", "url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml" }, { "name": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=49697", "refsource": "CONFIRM", "url": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=49697" }, { "name": "openSUSE-SU-2013:1295", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00004.html" }, { "name": "54296", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/54296" }, { "name": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8742", "refsource": "CONFIRM", "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8742" }, { "name": "http://www.wireshark.org/docs/relnotes/wireshark-1.8.9.html", "refsource": "CONFIRM", "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.8.9.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2013-4934", "datePublished": "2013-07-29T19:00:00", "dateReserved": "2013-07-26T00:00:00", "dateUpdated": "2024-08-06T16:59:40.994Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2013-4922 (GCVE-0-2013-4922)
Vulnerability from cvelistv5
Published
2013-07-29 19:00
Modified
2024-08-06 16:59
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Double free vulnerability in the dissect_dcom_ActivationProperties function in epan/dissectors/packet-dcom-sysact.c in the DCOM ISystemActivator dissector in Wireshark 1.10.x before 1.10.1 allows remote attackers to cause a denial of service (application crash) via a crafted packet.
References
URL | Tags | ||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:59:40.803Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8828" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=50094" }, { "name": "54425", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/54425" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.10.1.html" }, { "name": "GLSA-201308-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml" }, { "name": "oval:org.mitre.oval:def:17456", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17456" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.wireshark.org/security/wnpa-sec-2013-44.html" }, { "name": "54296", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/54296" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-dcom-sysact.c?r1=50094\u0026r2=50093\u0026pathrev=50094" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-07-26T00:00:00", "descriptions": [ { "lang": "en", "value": "Double free vulnerability in the dissect_dcom_ActivationProperties function in epan/dissectors/packet-dcom-sysact.c in the DCOM ISystemActivator dissector in Wireshark 1.10.x before 1.10.1 allows remote attackers to cause a denial of service (application crash) via a crafted packet." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8828" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=50094" }, { "name": "54425", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/54425" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.10.1.html" }, { "name": "GLSA-201308-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml" }, { "name": "oval:org.mitre.oval:def:17456", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17456" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.wireshark.org/security/wnpa-sec-2013-44.html" }, { "name": "54296", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/54296" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-dcom-sysact.c?r1=50094\u0026r2=50093\u0026pathrev=50094" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2013-4922", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Double free vulnerability in the dissect_dcom_ActivationProperties function in epan/dissectors/packet-dcom-sysact.c in the DCOM ISystemActivator dissector in Wireshark 1.10.x before 1.10.1 allows remote attackers to cause a denial of service (application crash) via a crafted packet." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8828", "refsource": "CONFIRM", "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8828" }, { "name": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=50094", "refsource": "CONFIRM", "url": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=50094" }, { "name": "54425", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/54425" }, { "name": "http://www.wireshark.org/docs/relnotes/wireshark-1.10.1.html", "refsource": "CONFIRM", "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.10.1.html" }, { "name": "GLSA-201308-05", "refsource": "GENTOO", "url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml" }, { "name": "oval:org.mitre.oval:def:17456", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17456" }, { "name": "https://www.wireshark.org/security/wnpa-sec-2013-44.html", "refsource": "CONFIRM", "url": "https://www.wireshark.org/security/wnpa-sec-2013-44.html" }, { "name": "54296", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/54296" }, { "name": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-dcom-sysact.c?r1=50094\u0026r2=50093\u0026pathrev=50094", "refsource": "CONFIRM", "url": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-dcom-sysact.c?r1=50094\u0026r2=50093\u0026pathrev=50094" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2013-4922", "datePublished": "2013-07-29T19:00:00", "dateReserved": "2013-07-26T00:00:00", "dateUpdated": "2024-08-06T16:59:40.803Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2013-1862 (GCVE-0-2013-1862)
Vulnerability from cvelistv5
Published
2013-06-10 17:00
Modified
2024-08-06 15:20
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
mod_rewrite.c in the mod_rewrite module in the Apache HTTP Server 2.2.x before 2.2.25 writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to execute arbitrary commands via an HTTP request containing an escape sequence for a terminal emulator.
References
URL | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T15:20:37.197Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=953729" }, { "name": "oval:org.mitre.oval:def:18790", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18790" }, { "name": "MDVSA-2013:174", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:174" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21644047" }, { "name": "SSRT101288", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "https://h20566.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?spf_p.tpst=kbDocDisplay\u0026spf_p.prp_kbDocDisplay=wsrp-navigationalState%3DdocId%253Demr_na-c03922406-1%257CdocLocale%253D%257CcalledBy%253D\u0026javax.portlet.begCacheTok=com.vignette.cachetoken\u0026javax.portlet.endCacheTok=com.vignette.cachetoken" }, { "name": "RHSA-2013:1209", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-1209.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://svn.apache.org/viewvc?view=revision\u0026revision=r1469311" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://people.apache.org/~jorton/mod_rewrite-CVE-2013-1862.patch" }, { "name": "openSUSE-SU-2013:1340", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00029.html" }, { "name": "RHSA-2013:0815", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-0815.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT6150" }, { "name": "USN-1903-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1903-1" }, { "name": "HPSBUX02927", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "https://h20566.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?spf_p.tpst=kbDocDisplay\u0026spf_p.prp_kbDocDisplay=wsrp-navigationalState%3DdocId%253Demr_na-c03922406-1%257CdocLocale%253D%257CcalledBy%253D\u0026javax.portlet.begCacheTok=com.vignette.cachetoken\u0026javax.portlet.endCacheTok=com.vignette.cachetoken" }, { "name": "RHSA-2013:1207", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-1207.html" }, { "name": "59826", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/59826" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.fujitsu.com/global/support/software/security/products-f/interstage-201303e.html" }, { "name": "RHSA-2013:1208", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-1208.html" }, { "name": "oval:org.mitre.oval:def:19534", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19534" }, { "name": "20130822 Apache HTTP Server mod_rewrite Log File Manipulation Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1862" }, { "name": "openSUSE-SU-2013:1341", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00030.html" }, { "name": "64758", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/64758" }, { "name": "55032", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/55032" }, { "name": "openSUSE-SU-2013:1337", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00026.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html" }, { "name": "[httpd-cvs] 20190815 svn commit: r1048742 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20190815 svn commit: r1048743 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20190815 svn commit: r1048743 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20190815 svn commit: r1048742 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20200401 svn commit: r1058586 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20200401 svn commit: r1058586 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20200401 svn commit: r1058587 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073139 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/json/", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1888194 [8/13] - /httpd/site/trunk/content/security/json/", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073149 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210603 svn commit: r1075360 [1/3] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210606 svn commit: r1075467 [1/2] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210606 svn commit: r1075470 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-04-19T00:00:00", "descriptions": [ { "lang": "en", "value": "mod_rewrite.c in the mod_rewrite module in the Apache HTTP Server 2.2.x before 2.2.25 writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to execute arbitrary commands via an HTTP request containing an escape sequence for a terminal emulator." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-06T10:10:21", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=953729" }, { "name": "oval:org.mitre.oval:def:18790", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18790" }, { "name": "MDVSA-2013:174", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:174" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21644047" }, { "name": "SSRT101288", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "https://h20566.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?spf_p.tpst=kbDocDisplay\u0026spf_p.prp_kbDocDisplay=wsrp-navigationalState%3DdocId%253Demr_na-c03922406-1%257CdocLocale%253D%257CcalledBy%253D\u0026javax.portlet.begCacheTok=com.vignette.cachetoken\u0026javax.portlet.endCacheTok=com.vignette.cachetoken" }, { "name": "RHSA-2013:1209", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-1209.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://svn.apache.org/viewvc?view=revision\u0026revision=r1469311" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://people.apache.org/~jorton/mod_rewrite-CVE-2013-1862.patch" }, { "name": "openSUSE-SU-2013:1340", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00029.html" }, { "name": "RHSA-2013:0815", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-0815.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT6150" }, { "name": "USN-1903-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1903-1" }, { "name": "HPSBUX02927", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "https://h20566.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?spf_p.tpst=kbDocDisplay\u0026spf_p.prp_kbDocDisplay=wsrp-navigationalState%3DdocId%253Demr_na-c03922406-1%257CdocLocale%253D%257CcalledBy%253D\u0026javax.portlet.begCacheTok=com.vignette.cachetoken\u0026javax.portlet.endCacheTok=com.vignette.cachetoken" }, { "name": "RHSA-2013:1207", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-1207.html" }, { "name": "59826", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/59826" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.fujitsu.com/global/support/software/security/products-f/interstage-201303e.html" }, { "name": "RHSA-2013:1208", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-1208.html" }, { "name": "oval:org.mitre.oval:def:19534", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19534" }, { "name": "20130822 Apache HTTP Server mod_rewrite Log File Manipulation Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1862" }, { "name": "openSUSE-SU-2013:1341", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00030.html" }, { "name": "64758", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/64758" }, { "name": "55032", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/55032" }, { "name": "openSUSE-SU-2013:1337", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00026.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html" }, { "name": "[httpd-cvs] 20190815 svn commit: r1048742 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20190815 svn commit: r1048743 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20190815 svn commit: r1048743 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20190815 svn commit: r1048742 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20200401 svn commit: r1058586 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20200401 svn commit: r1058586 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20200401 svn commit: r1058587 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073139 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/json/", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1888194 [8/13] - /httpd/site/trunk/content/security/json/", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073149 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210603 svn commit: r1075360 [1/3] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210606 svn commit: r1075467 [1/2] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210606 svn commit: r1075470 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-1862", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "mod_rewrite.c in the mod_rewrite module in the Apache HTTP Server 2.2.x before 2.2.25 writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to execute arbitrary commands via an HTTP request containing an escape sequence for a terminal emulator." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=953729", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=953729" }, { "name": "oval:org.mitre.oval:def:18790", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18790" }, { "name": "MDVSA-2013:174", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:174" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21644047", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21644047" }, { "name": "SSRT101288", "refsource": "HP", "url": "https://h20566.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?spf_p.tpst=kbDocDisplay\u0026spf_p.prp_kbDocDisplay=wsrp-navigationalState%3DdocId%253Demr_na-c03922406-1%257CdocLocale%253D%257CcalledBy%253D\u0026javax.portlet.begCacheTok=com.vignette.cachetoken\u0026javax.portlet.endCacheTok=com.vignette.cachetoken" }, { "name": "RHSA-2013:1209", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2013-1209.html" }, { "name": "http://svn.apache.org/viewvc?view=revision\u0026revision=r1469311", "refsource": "CONFIRM", "url": "http://svn.apache.org/viewvc?view=revision\u0026revision=r1469311" }, { "name": "http://people.apache.org/~jorton/mod_rewrite-CVE-2013-1862.patch", "refsource": "CONFIRM", "url": "http://people.apache.org/~jorton/mod_rewrite-CVE-2013-1862.patch" }, { "name": "openSUSE-SU-2013:1340", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00029.html" }, { "name": "RHSA-2013:0815", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2013-0815.html" }, { "name": "http://support.apple.com/kb/HT6150", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT6150" }, { "name": "USN-1903-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-1903-1" }, { "name": "HPSBUX02927", "refsource": "HP", "url": "https://h20566.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?spf_p.tpst=kbDocDisplay\u0026spf_p.prp_kbDocDisplay=wsrp-navigationalState%3DdocId%253Demr_na-c03922406-1%257CdocLocale%253D%257CcalledBy%253D\u0026javax.portlet.begCacheTok=com.vignette.cachetoken\u0026javax.portlet.endCacheTok=com.vignette.cachetoken" }, { "name": "RHSA-2013:1207", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2013-1207.html" }, { "name": "59826", "refsource": "BID", "url": "http://www.securityfocus.com/bid/59826" }, { "name": "http://www.fujitsu.com/global/support/software/security/products-f/interstage-201303e.html", "refsource": "CONFIRM", "url": "http://www.fujitsu.com/global/support/software/security/products-f/interstage-201303e.html" }, { "name": "RHSA-2013:1208", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2013-1208.html" }, { "name": "oval:org.mitre.oval:def:19534", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19534" }, { "name": "20130822 Apache HTTP Server mod_rewrite Log File Manipulation Vulnerability", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1862" }, { "name": "openSUSE-SU-2013:1341", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00030.html" }, { "name": "64758", "refsource": "BID", "url": "http://www.securityfocus.com/bid/64758" }, { "name": "55032", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/55032" }, { "name": "openSUSE-SU-2013:1337", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00026.html" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html" }, { "name": "[httpd-cvs] 20190815 svn commit: r1048742 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20190815 svn commit: r1048743 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20190815 svn commit: r1048743 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20190815 svn commit: r1048742 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20200401 svn commit: r1058586 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20200401 svn commit: r1058586 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20200401 svn commit: r1058587 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073139 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/json/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1888194 [8/13] - /httpd/site/trunk/content/security/json/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073149 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210603 svn commit: r1075360 [1/3] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210606 svn commit: r1075467 [1/2] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210606 svn commit: r1075470 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-1862", "datePublished": "2013-06-10T17:00:00", "dateReserved": "2013-02-19T00:00:00", "dateUpdated": "2024-08-06T15:20:37.197Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2013-4935 (GCVE-0-2013-4935)
Vulnerability from cvelistv5
Published
2013-07-29 19:00
Modified
2024-08-06 16:59
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The dissect_per_length_determinant function in epan/dissectors/packet-per.c in the ASN.1 PER dissector in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not initialize a length field in certain abnormal situations, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
References
URL | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:59:40.873Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "54371", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/54371" }, { "name": "openSUSE-SU-2013:1300", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00009.html" }, { "name": "54178", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/54178" }, { "name": "RHSA-2014:0341", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0341.html" }, { "name": "54425", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/54425" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.wireshark.org/security/wnpa-sec-2013-52.html" }, { "name": "DSA-2734", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2013/dsa-2734" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-per.c?r1=49985\u0026r2=49984\u0026pathrev=49985" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.10.1.html" }, { "name": "GLSA-201308-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml" }, { "name": "openSUSE-SU-2013:1295", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00004.html" }, { "name": "54296", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/54296" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=49985" }, { "name": "oval:org.mitre.oval:def:17417", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17417" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8722" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.8.9.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-07-26T00:00:00", "descriptions": [ { "lang": "en", "value": "The dissect_per_length_determinant function in epan/dissectors/packet-per.c in the ASN.1 PER dissector in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not initialize a length field in certain abnormal situations, which allows remote attackers to cause a denial of service (application crash) via a crafted packet." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "54371", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/54371" }, { "name": "openSUSE-SU-2013:1300", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00009.html" }, { "name": "54178", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/54178" }, { "name": "RHSA-2014:0341", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0341.html" }, { "name": "54425", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/54425" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.wireshark.org/security/wnpa-sec-2013-52.html" }, { "name": "DSA-2734", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2013/dsa-2734" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-per.c?r1=49985\u0026r2=49984\u0026pathrev=49985" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.10.1.html" }, { "name": "GLSA-201308-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml" }, { "name": "openSUSE-SU-2013:1295", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00004.html" }, { "name": "54296", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/54296" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=49985" }, { "name": "oval:org.mitre.oval:def:17417", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17417" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8722" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.8.9.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2013-4935", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The dissect_per_length_determinant function in epan/dissectors/packet-per.c in the ASN.1 PER dissector in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not initialize a length field in certain abnormal situations, which allows remote attackers to cause a denial of service (application crash) via a crafted packet." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "54371", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/54371" }, { "name": "openSUSE-SU-2013:1300", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00009.html" }, { "name": "54178", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/54178" }, { "name": "RHSA-2014:0341", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-0341.html" }, { "name": "54425", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/54425" }, { "name": "https://www.wireshark.org/security/wnpa-sec-2013-52.html", "refsource": "CONFIRM", "url": "https://www.wireshark.org/security/wnpa-sec-2013-52.html" }, { "name": "DSA-2734", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2013/dsa-2734" }, { "name": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-per.c?r1=49985\u0026r2=49984\u0026pathrev=49985", "refsource": "CONFIRM", "url": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-per.c?r1=49985\u0026r2=49984\u0026pathrev=49985" }, { "name": "http://www.wireshark.org/docs/relnotes/wireshark-1.10.1.html", "refsource": "CONFIRM", "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.10.1.html" }, { "name": "GLSA-201308-05", "refsource": "GENTOO", "url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml" }, { "name": "openSUSE-SU-2013:1295", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00004.html" }, { "name": "54296", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/54296" }, { "name": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=49985", "refsource": "CONFIRM", "url": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=49985" }, { "name": "oval:org.mitre.oval:def:17417", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17417" }, { "name": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8722", "refsource": "CONFIRM", "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8722" }, { "name": "http://www.wireshark.org/docs/relnotes/wireshark-1.8.9.html", "refsource": "CONFIRM", "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.8.9.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2013-4935", "datePublished": "2013-07-29T19:00:00", "dateReserved": "2013-07-26T00:00:00", "dateUpdated": "2024-08-06T16:59:40.873Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-3048 (GCVE-0-2011-3048)
Vulnerability from cvelistv5
Published
2012-05-29 20:00
Modified
2024-08-06 23:22
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The png_set_text_2 function in pngset.c in libpng 1.0.x before 1.0.59, 1.2.x before 1.2.49, 1.4.x before 1.4.11, and 1.5.x before 1.5.10 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted text chunk in a PNG image file, which triggers a memory allocation failure that is not properly handled, leading to a heap-based buffer overflow.
References
URL | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T23:22:27.083Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "49660", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/49660" }, { "name": "48983", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/48983" }, { "name": "RHSA-2012:0523", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-0523.html" }, { "name": "libpng-pngsettext2-code-execution(74494)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74494" }, { "name": "APPLE-SA-2012-09-19-1", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT5503" }, { "name": "52830", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/52830" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.libpng.org/pub/png/src/libpng-1.5.10-README.txt" }, { "name": "DSA-2446", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2012/dsa-2446" }, { "name": "GLSA-201206-15", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201206-15.xml" }, { "name": "MDVSA-2012:046", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:046" }, { "name": "48587", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/48587" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.libpng.org/pub/png/libpng.html" }, { "name": "80822", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/80822" }, { "name": "FEDORA-2012-5526", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077472.html" }, { "name": "48644", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/48644" }, { "name": "FEDORA-2012-5079", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077007.html" }, { "name": "APPLE-SA-2012-09-19-2", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT5501" }, { "name": "FEDORA-2012-5515", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/079039.html" }, { "name": "FEDORA-2012-5080", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077043.html" }, { "name": "1026879", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1026879" }, { "name": "FEDORA-2012-5518", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/079051.html" }, { "name": "48665", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/48665" }, { "name": "FEDORA-2012-4902", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077819.html" }, { "name": "48721", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/48721" }, { "name": "USN-1417-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://ubuntu.com/usn/usn-1417-1" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-03-29T00:00:00", "descriptions": [ { "lang": "en", "value": "The png_set_text_2 function in pngset.c in libpng 1.0.x before 1.0.59, 1.2.x before 1.2.49, 1.4.x before 1.4.11, and 1.5.x before 1.5.10 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted text chunk in a PNG image file, which triggers a memory allocation failure that is not properly handled, leading to a heap-based buffer overflow." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-12-28T20:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "49660", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/49660" }, { "name": "48983", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/48983" }, { "name": "RHSA-2012:0523", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-0523.html" }, { "name": "libpng-pngsettext2-code-execution(74494)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74494" }, { "name": "APPLE-SA-2012-09-19-1", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT5503" }, { "name": "52830", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/52830" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.libpng.org/pub/png/src/libpng-1.5.10-README.txt" }, { "name": "DSA-2446", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2012/dsa-2446" }, { "name": "GLSA-201206-15", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201206-15.xml" }, { "name": "MDVSA-2012:046", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:046" }, { "name": "48587", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/48587" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.libpng.org/pub/png/libpng.html" }, { "name": "80822", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/80822" }, { "name": "FEDORA-2012-5526", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077472.html" }, { "name": "48644", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/48644" }, { "name": "FEDORA-2012-5079", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077007.html" }, { "name": "APPLE-SA-2012-09-19-2", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT5501" }, { "name": "FEDORA-2012-5515", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/079039.html" }, { "name": "FEDORA-2012-5080", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077043.html" }, { "name": "1026879", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1026879" }, { "name": "FEDORA-2012-5518", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/079051.html" }, { "name": "48665", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/48665" }, { "name": "FEDORA-2012-4902", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077819.html" }, { "name": "48721", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/48721" }, { "name": "USN-1417-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://ubuntu.com/usn/usn-1417-1" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2011-3048", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The png_set_text_2 function in pngset.c in libpng 1.0.x before 1.0.59, 1.2.x before 1.2.49, 1.4.x before 1.4.11, and 1.5.x before 1.5.10 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted text chunk in a PNG image file, which triggers a memory allocation failure that is not properly handled, leading to a heap-based buffer overflow." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "49660", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/49660" }, { "name": "48983", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/48983" }, { "name": "RHSA-2012:0523", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2012-0523.html" }, { "name": "libpng-pngsettext2-code-execution(74494)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/74494" }, { "name": "APPLE-SA-2012-09-19-1", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html" }, { "name": "http://support.apple.com/kb/HT5503", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT5503" }, { "name": "52830", "refsource": "BID", "url": "http://www.securityfocus.com/bid/52830" }, { "name": "http://www.libpng.org/pub/png/src/libpng-1.5.10-README.txt", "refsource": "CONFIRM", "url": "http://www.libpng.org/pub/png/src/libpng-1.5.10-README.txt" }, { "name": "DSA-2446", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2012/dsa-2446" }, { "name": "GLSA-201206-15", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-201206-15.xml" }, { "name": "MDVSA-2012:046", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:046" }, { "name": "48587", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/48587" }, { "name": "http://www.libpng.org/pub/png/libpng.html", "refsource": "CONFIRM", "url": "http://www.libpng.org/pub/png/libpng.html" }, { "name": "80822", "refsource": "OSVDB", "url": "http://www.osvdb.org/80822" }, { "name": "FEDORA-2012-5526", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077472.html" }, { "name": "48644", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/48644" }, { "name": "FEDORA-2012-5079", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077007.html" }, { "name": "APPLE-SA-2012-09-19-2", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html" }, { "name": "http://support.apple.com/kb/HT5501", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT5501" }, { "name": "FEDORA-2012-5515", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/079039.html" }, { "name": "FEDORA-2012-5080", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077043.html" }, { "name": "1026879", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1026879" }, { "name": "FEDORA-2012-5518", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/079051.html" }, { "name": "48665", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/48665" }, { "name": "FEDORA-2012-4902", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077819.html" }, { "name": "48721", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/48721" }, { "name": "USN-1417-1", "refsource": "UBUNTU", "url": "http://ubuntu.com/usn/usn-1417-1" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2011-3048", "datePublished": "2012-05-29T20:00:00", "dateReserved": "2011-08-09T00:00:00", "dateUpdated": "2024-08-06T23:22:27.083Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2013-4927 (GCVE-0-2013-4927)
Vulnerability from cvelistv5
Published
2013-07-29 19:00
Modified
2024-08-06 16:59
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Integer signedness error in the get_type_length function in epan/dissectors/packet-btsdp.c in the Bluetooth SDP dissector in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 allows remote attackers to cause a denial of service (loop and CPU consumption) via a crafted packet.
References
URL | Tags | |||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:59:40.985Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "54371", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/54371" }, { "name": "openSUSE-SU-2013:1300", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00009.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=50134" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.wireshark.org/security/wnpa-sec-2013-45.html" }, { "name": "RHSA-2014:0341", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0341.html" }, { "name": "54425", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/54425" }, { "name": "oval:org.mitre.oval:def:17636", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17636" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.10.1.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8831" }, { "name": "GLSA-201308-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-btsdp.c?r1=50134\u0026r2=50133\u0026pathrev=50134" }, { "name": "openSUSE-SU-2013:1295", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00004.html" }, { "name": "54296", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/54296" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.8.9.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-07-26T00:00:00", "descriptions": [ { "lang": "en", "value": "Integer signedness error in the get_type_length function in epan/dissectors/packet-btsdp.c in the Bluetooth SDP dissector in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 allows remote attackers to cause a denial of service (loop and CPU consumption) via a crafted packet." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "54371", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/54371" }, { "name": "openSUSE-SU-2013:1300", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00009.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=50134" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.wireshark.org/security/wnpa-sec-2013-45.html" }, { "name": "RHSA-2014:0341", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0341.html" }, { "name": "54425", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/54425" }, { "name": "oval:org.mitre.oval:def:17636", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17636" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.10.1.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8831" }, { "name": "GLSA-201308-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-btsdp.c?r1=50134\u0026r2=50133\u0026pathrev=50134" }, { "name": "openSUSE-SU-2013:1295", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00004.html" }, { "name": "54296", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/54296" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.8.9.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2013-4927", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Integer signedness error in the get_type_length function in epan/dissectors/packet-btsdp.c in the Bluetooth SDP dissector in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 allows remote attackers to cause a denial of service (loop and CPU consumption) via a crafted packet." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "54371", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/54371" }, { "name": "openSUSE-SU-2013:1300", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00009.html" }, { "name": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=50134", "refsource": "CONFIRM", "url": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=50134" }, { "name": "https://www.wireshark.org/security/wnpa-sec-2013-45.html", "refsource": "CONFIRM", "url": "https://www.wireshark.org/security/wnpa-sec-2013-45.html" }, { "name": "RHSA-2014:0341", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-0341.html" }, { "name": "54425", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/54425" }, { "name": "oval:org.mitre.oval:def:17636", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17636" }, { "name": "http://www.wireshark.org/docs/relnotes/wireshark-1.10.1.html", "refsource": "CONFIRM", "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.10.1.html" }, { "name": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8831", "refsource": "CONFIRM", "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8831" }, { "name": "GLSA-201308-05", "refsource": "GENTOO", "url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml" }, { "name": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-btsdp.c?r1=50134\u0026r2=50133\u0026pathrev=50134", "refsource": "CONFIRM", "url": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-btsdp.c?r1=50134\u0026r2=50133\u0026pathrev=50134" }, { "name": "openSUSE-SU-2013:1295", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00004.html" }, { "name": "54296", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/54296" }, { "name": "http://www.wireshark.org/docs/relnotes/wireshark-1.8.9.html", "refsource": "CONFIRM", "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.8.9.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2013-4927", "datePublished": "2013-07-29T19:00:00", "dateReserved": "2013-07-26T00:00:00", "dateUpdated": "2024-08-06T16:59:40.985Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2011-1071 (GCVE-0-2011-1071)
Vulnerability from cvelistv5
Published
2011-04-08 15:00
Modified
2024-08-06 22:14
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The GNU C Library (aka glibc or libc6) before 2.12.2 and Embedded GLIBC (EGLIBC) allow context-dependent attackers to execute arbitrary code or cause a denial of service (memory consumption) via a long UTF8 string that is used in an fnmatch call, aka a "stack extension attack," a related issue to CVE-2010-2898, CVE-2010-1917, and CVE-2007-4782, as originally reported for use of this library by Google Chrome.
References
URL | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T22:14:27.827Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "46563", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/46563" }, { "name": "8175", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/8175" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=681054" }, { "name": "20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/520102/100/0/threaded" }, { "name": "46397", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/46397" }, { "name": "RHSA-2011:0412", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0412.html" }, { "name": "ADV-2011-0863", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0863" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://bugs.debian.org/615120" }, { "name": "43989", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/43989" }, { "name": "1025290", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1025290" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://sourceware.org/bugzilla/show_bug.cgi?id=11883" }, { "name": "43492", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/43492" }, { "name": "[oss-security] 20110228 cve request: eglibc memory corruption", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2011/02/26/3" }, { "name": "oval:org.mitre.oval:def:12853", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12853" }, { "name": "[oss-security] 20110228 Re: cve request: eglibc memory corruption", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2011/02/28/11" }, { "name": "20110224 glibc and alloca()", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2011/Feb/635" }, { "name": "20110226 Re: glibc and alloca()", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2011/Feb/644" }, { "name": "MDVSA-2011:178", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:178" }, { "name": "43830", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/43830" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=f15ce4d8dc139523fe0c273580b604b2453acba6" }, { "name": "RHSA-2011:0413", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0413.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://scarybeastsecurity.blogspot.com/2011/02/i-got-accidental-code-execution-via.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html" }, { "name": "[oss-security] 20110228 Re: cve request: eglibc memory corruption", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2011/02/28/15" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://code.google.com/p/chromium/issues/detail?id=48733" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-02-24T00:00:00", "descriptions": [ { "lang": "en", "value": "The GNU C Library (aka glibc or libc6) before 2.12.2 and Embedded GLIBC (EGLIBC) allow context-dependent attackers to execute arbitrary code or cause a denial of service (memory consumption) via a long UTF8 string that is used in an fnmatch call, aka a \"stack extension attack,\" a related issue to CVE-2010-2898, CVE-2010-1917, and CVE-2007-4782, as originally reported for use of this library by Google Chrome." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-09T18:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "46563", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/46563" }, { "name": "8175", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/8175" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=681054" }, { "name": "20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/520102/100/0/threaded" }, { "name": "46397", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/46397" }, { "name": "RHSA-2011:0412", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0412.html" }, { "name": "ADV-2011-0863", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0863" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://bugs.debian.org/615120" }, { "name": "43989", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/43989" }, { "name": "1025290", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1025290" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://sourceware.org/bugzilla/show_bug.cgi?id=11883" }, { "name": "43492", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/43492" }, { "name": "[oss-security] 20110228 cve request: eglibc memory corruption", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://openwall.com/lists/oss-security/2011/02/26/3" }, { "name": "oval:org.mitre.oval:def:12853", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12853" }, { "name": "[oss-security] 20110228 Re: cve request: eglibc memory corruption", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://openwall.com/lists/oss-security/2011/02/28/11" }, { "name": "20110224 glibc and alloca()", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2011/Feb/635" }, { "name": "20110226 Re: glibc and alloca()", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2011/Feb/644" }, { "name": "MDVSA-2011:178", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:178" }, { "name": "43830", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/43830" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=f15ce4d8dc139523fe0c273580b604b2453acba6" }, { "name": "RHSA-2011:0413", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0413.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://scarybeastsecurity.blogspot.com/2011/02/i-got-accidental-code-execution-via.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vmware.com/security/advisories/VMSA-2011-0012.html" }, { "name": "[oss-security] 20110228 Re: cve request: eglibc memory corruption", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://openwall.com/lists/oss-security/2011/02/28/15" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://code.google.com/p/chromium/issues/detail?id=48733" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2011-1071", "datePublished": "2011-04-08T15:00:00", "dateReserved": "2011-02-24T00:00:00", "dateUpdated": "2024-08-06T22:14:27.827Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2013-4925 (GCVE-0-2013-4925)
Vulnerability from cvelistv5
Published
2013-07-29 19:00
Modified
2024-08-06 16:59
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Integer signedness error in epan/dissectors/packet-dcom-sysact.c in the DCOM ISystemActivator dissector in Wireshark 1.10.x before 1.10.1 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a crafted packet.
References
URL | Tags | ||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:59:41.208Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8828" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-dcom-sysact.c?r1=50478\u0026r2=50477\u0026pathrev=50478" }, { "name": "oval:org.mitre.oval:def:17585", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17585" }, { "name": "54425", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/54425" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.10.1.html" }, { "name": "GLSA-201308-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.wireshark.org/security/wnpa-sec-2013-44.html" }, { "name": "54296", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/54296" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=50478" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-07-26T00:00:00", "descriptions": [ { "lang": "en", "value": "Integer signedness error in epan/dissectors/packet-dcom-sysact.c in the DCOM ISystemActivator dissector in Wireshark 1.10.x before 1.10.1 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a crafted packet." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8828" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-dcom-sysact.c?r1=50478\u0026r2=50477\u0026pathrev=50478" }, { "name": "oval:org.mitre.oval:def:17585", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17585" }, { "name": "54425", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/54425" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.10.1.html" }, { "name": "GLSA-201308-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.wireshark.org/security/wnpa-sec-2013-44.html" }, { "name": "54296", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/54296" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=50478" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2013-4925", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Integer signedness error in epan/dissectors/packet-dcom-sysact.c in the DCOM ISystemActivator dissector in Wireshark 1.10.x before 1.10.1 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a crafted packet." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8828", "refsource": "CONFIRM", "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8828" }, { "name": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-dcom-sysact.c?r1=50478\u0026r2=50477\u0026pathrev=50478", "refsource": "CONFIRM", "url": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-dcom-sysact.c?r1=50478\u0026r2=50477\u0026pathrev=50478" }, { "name": "oval:org.mitre.oval:def:17585", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17585" }, { "name": "54425", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/54425" }, { "name": "http://www.wireshark.org/docs/relnotes/wireshark-1.10.1.html", "refsource": "CONFIRM", "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.10.1.html" }, { "name": "GLSA-201308-05", "refsource": "GENTOO", "url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml" }, { "name": "https://www.wireshark.org/security/wnpa-sec-2013-44.html", "refsource": "CONFIRM", "url": "https://www.wireshark.org/security/wnpa-sec-2013-44.html" }, { "name": "54296", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/54296" }, { "name": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=50478", "refsource": "CONFIRM", "url": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=50478" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2013-4925", "datePublished": "2013-07-29T19:00:00", "dateReserved": "2013-07-26T00:00:00", "dateUpdated": "2024-08-06T16:59:41.208Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2013-4936 (GCVE-0-2013-4936)
Vulnerability from cvelistv5
Published
2013-07-29 19:00
Modified
2024-08-06 16:59
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The IsDFP_Frame function in plugins/profinet/packet-pn-rt.c in the PROFINET Real-Time dissector in Wireshark 1.10.x before 1.10.1 does not validate MAC addresses, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted packet.
References
URL | Tags | ||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:59:40.969Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.wireshark.org/security/wnpa-sec-2013-53.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=50651" }, { "name": "54425", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/54425" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.10.1.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8904" }, { "name": "GLSA-201308-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml" }, { "name": "oval:org.mitre.oval:def:16971", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16971" }, { "name": "54296", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/54296" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://anonsvn.wireshark.org/viewvc/trunk/plugins/profinet/packet-pn-rt.c?r1=50651\u0026r2=50650\u0026pathrev=50651" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-07-26T00:00:00", "descriptions": [ { "lang": "en", "value": "The IsDFP_Frame function in plugins/profinet/packet-pn-rt.c in the PROFINET Real-Time dissector in Wireshark 1.10.x before 1.10.1 does not validate MAC addresses, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted packet." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.wireshark.org/security/wnpa-sec-2013-53.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=50651" }, { "name": "54425", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/54425" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.10.1.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8904" }, { "name": "GLSA-201308-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml" }, { "name": "oval:org.mitre.oval:def:16971", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16971" }, { "name": "54296", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/54296" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://anonsvn.wireshark.org/viewvc/trunk/plugins/profinet/packet-pn-rt.c?r1=50651\u0026r2=50650\u0026pathrev=50651" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2013-4936", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The IsDFP_Frame function in plugins/profinet/packet-pn-rt.c in the PROFINET Real-Time dissector in Wireshark 1.10.x before 1.10.1 does not validate MAC addresses, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted packet." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.wireshark.org/security/wnpa-sec-2013-53.html", "refsource": "CONFIRM", "url": "https://www.wireshark.org/security/wnpa-sec-2013-53.html" }, { "name": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=50651", "refsource": "CONFIRM", "url": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=50651" }, { "name": "54425", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/54425" }, { "name": "http://www.wireshark.org/docs/relnotes/wireshark-1.10.1.html", "refsource": "CONFIRM", "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.10.1.html" }, { "name": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8904", "refsource": "CONFIRM", "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8904" }, { "name": "GLSA-201308-05", "refsource": "GENTOO", "url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml" }, { "name": "oval:org.mitre.oval:def:16971", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16971" }, { "name": "54296", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/54296" }, { "name": "http://anonsvn.wireshark.org/viewvc/trunk/plugins/profinet/packet-pn-rt.c?r1=50651\u0026r2=50650\u0026pathrev=50651", "refsource": "CONFIRM", "url": "http://anonsvn.wireshark.org/viewvc/trunk/plugins/profinet/packet-pn-rt.c?r1=50651\u0026r2=50650\u0026pathrev=50651" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2013-4936", "datePublished": "2013-07-29T19:00:00", "dateReserved": "2013-07-26T00:00:00", "dateUpdated": "2024-08-06T16:59:40.969Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2013-4082 (GCVE-0-2013-4082)
Vulnerability from cvelistv5
Published
2013-06-09 21:00
Modified
2024-08-06 16:30
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The vwr_read function in wiretap/vwr.c in the Ixia IxVeriWave file parser in Wireshark 1.8.x before 1.8.8 does not validate the relationship between a record length and a trailer length, which allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) via a crafted packet.
References
URL | Tags | |||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:30:49.925Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.8.8.html" }, { "name": "53762", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/53762" }, { "name": "54425", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/54425" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8760" }, { "name": "GLSA-201308-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml" }, { "name": "openSUSE-SU-2013:1086", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00196.html" }, { "name": "DSA-2709", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2013/dsa-2709" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=49739" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://anonsvn.wireshark.org/viewvc/trunk/wiretap/vwr.c?r1=49739\u0026r2=49738\u0026pathrev=49739" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.wireshark.org/security/wnpa-sec-2013-40.html" }, { "name": "oval:org.mitre.oval:def:16886", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16886" }, { "name": "openSUSE-SU-2013:1084", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00194.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-06-07T00:00:00", "descriptions": [ { "lang": "en", "value": "The vwr_read function in wiretap/vwr.c in the Ixia IxVeriWave file parser in Wireshark 1.8.x before 1.8.8 does not validate the relationship between a record length and a trailer length, which allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) via a crafted packet." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.8.8.html" }, { "name": "53762", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/53762" }, { "name": "54425", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/54425" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8760" }, { "name": "GLSA-201308-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml" }, { "name": "openSUSE-SU-2013:1086", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00196.html" }, { "name": "DSA-2709", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2013/dsa-2709" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=49739" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://anonsvn.wireshark.org/viewvc/trunk/wiretap/vwr.c?r1=49739\u0026r2=49738\u0026pathrev=49739" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.wireshark.org/security/wnpa-sec-2013-40.html" }, { "name": "oval:org.mitre.oval:def:16886", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16886" }, { "name": "openSUSE-SU-2013:1084", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00194.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2013-4082", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The vwr_read function in wiretap/vwr.c in the Ixia IxVeriWave file parser in Wireshark 1.8.x before 1.8.8 does not validate the relationship between a record length and a trailer length, which allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) via a crafted packet." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.wireshark.org/docs/relnotes/wireshark-1.8.8.html", "refsource": "CONFIRM", "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.8.8.html" }, { "name": "53762", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/53762" }, { "name": "54425", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/54425" }, { "name": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8760", "refsource": "CONFIRM", "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8760" }, { "name": "GLSA-201308-05", "refsource": "GENTOO", "url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml" }, { "name": "openSUSE-SU-2013:1086", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00196.html" }, { "name": "DSA-2709", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2013/dsa-2709" }, { "name": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=49739", "refsource": "CONFIRM", "url": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=49739" }, { "name": "http://anonsvn.wireshark.org/viewvc/trunk/wiretap/vwr.c?r1=49739\u0026r2=49738\u0026pathrev=49739", "refsource": "CONFIRM", "url": "http://anonsvn.wireshark.org/viewvc/trunk/wiretap/vwr.c?r1=49739\u0026r2=49738\u0026pathrev=49739" }, { "name": "http://www.wireshark.org/security/wnpa-sec-2013-40.html", "refsource": "CONFIRM", "url": "http://www.wireshark.org/security/wnpa-sec-2013-40.html" }, { "name": "oval:org.mitre.oval:def:16886", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16886" }, { "name": "openSUSE-SU-2013:1084", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00194.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2013-4082", "datePublished": "2013-06-09T21:00:00", "dateReserved": "2013-06-09T00:00:00", "dateUpdated": "2024-08-06T16:30:49.925Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2013-4076 (GCVE-0-2013-4076)
Vulnerability from cvelistv5
Published
2013-06-09 21:00
Modified
2024-08-06 16:30
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Buffer overflow in the dissect_iphc_crtp_fh function in epan/dissectors/packet-ppp.c in the PPP dissector in Wireshark 1.8.x before 1.8.8 allows remote attackers to cause a denial of service (application crash) via a crafted packet.
References
URL | Tags | ||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:30:49.899Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7880" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.8.8.html" }, { "name": "53762", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/53762" }, { "name": "54425", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/54425" }, { "name": "GLSA-201308-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml" }, { "name": "openSUSE-SU-2013:1086", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00196.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8727" }, { "name": "DSA-2709", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2013/dsa-2709" }, { "name": "oval:org.mitre.oval:def:16676", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16676" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.wireshark.org/security/wnpa-sec-2013-34.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=46128" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-ppp.c?r1=46128\u0026r2=46127\u0026pathrev=46128" }, { "name": "openSUSE-SU-2013:1084", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00194.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-06-07T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in the dissect_iphc_crtp_fh function in epan/dissectors/packet-ppp.c in the PPP dissector in Wireshark 1.8.x before 1.8.8 allows remote attackers to cause a denial of service (application crash) via a crafted packet." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7880" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.8.8.html" }, { "name": "53762", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/53762" }, { "name": "54425", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/54425" }, { "name": "GLSA-201308-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml" }, { "name": "openSUSE-SU-2013:1086", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00196.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8727" }, { "name": "DSA-2709", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2013/dsa-2709" }, { "name": "oval:org.mitre.oval:def:16676", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16676" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.wireshark.org/security/wnpa-sec-2013-34.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=46128" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-ppp.c?r1=46128\u0026r2=46127\u0026pathrev=46128" }, { "name": "openSUSE-SU-2013:1084", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00194.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2013-4076", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in the dissect_iphc_crtp_fh function in epan/dissectors/packet-ppp.c in the PPP dissector in Wireshark 1.8.x before 1.8.8 allows remote attackers to cause a denial of service (application crash) via a crafted packet." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7880", "refsource": "CONFIRM", "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7880" }, { "name": "http://www.wireshark.org/docs/relnotes/wireshark-1.8.8.html", "refsource": "CONFIRM", "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.8.8.html" }, { "name": "53762", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/53762" }, { "name": "54425", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/54425" }, { "name": "GLSA-201308-05", "refsource": "GENTOO", "url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml" }, { "name": "openSUSE-SU-2013:1086", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00196.html" }, { "name": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8727", "refsource": "CONFIRM", "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8727" }, { "name": "DSA-2709", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2013/dsa-2709" }, { "name": "oval:org.mitre.oval:def:16676", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16676" }, { "name": "http://www.wireshark.org/security/wnpa-sec-2013-34.html", "refsource": "CONFIRM", "url": "http://www.wireshark.org/security/wnpa-sec-2013-34.html" }, { "name": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=46128", "refsource": "CONFIRM", "url": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=46128" }, { "name": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-ppp.c?r1=46128\u0026r2=46127\u0026pathrev=46128", "refsource": "CONFIRM", "url": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-ppp.c?r1=46128\u0026r2=46127\u0026pathrev=46128" }, { "name": "openSUSE-SU-2013:1084", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00194.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2013-4076", "datePublished": "2013-06-09T21:00:00", "dateReserved": "2013-06-09T00:00:00", "dateUpdated": "2024-08-06T16:30:49.899Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2013-4923 (GCVE-0-2013-4923)
Vulnerability from cvelistv5
Published
2013-07-29 19:00
Modified
2024-08-06 16:59
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Memory leak in the dissect_dcom_ActivationProperties function in epan/dissectors/packet-dcom-sysact.c in the DCOM ISystemActivator dissector in Wireshark 1.10.x before 1.10.1 allows remote attackers to cause a denial of service (memory consumption) via crafted packets.
References
URL | Tags | ||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:59:41.120Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8828" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=50094" }, { "name": "54425", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/54425" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.10.1.html" }, { "name": "GLSA-201308-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.wireshark.org/security/wnpa-sec-2013-44.html" }, { "name": "54296", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/54296" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-dcom-sysact.c?r1=50094\u0026r2=50093\u0026pathrev=50094" }, { "name": "oval:org.mitre.oval:def:16731", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16731" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-07-26T00:00:00", "descriptions": [ { "lang": "en", "value": "Memory leak in the dissect_dcom_ActivationProperties function in epan/dissectors/packet-dcom-sysact.c in the DCOM ISystemActivator dissector in Wireshark 1.10.x before 1.10.1 allows remote attackers to cause a denial of service (memory consumption) via crafted packets." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8828" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=50094" }, { "name": "54425", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/54425" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.10.1.html" }, { "name": "GLSA-201308-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.wireshark.org/security/wnpa-sec-2013-44.html" }, { "name": "54296", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/54296" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-dcom-sysact.c?r1=50094\u0026r2=50093\u0026pathrev=50094" }, { "name": "oval:org.mitre.oval:def:16731", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16731" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2013-4923", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Memory leak in the dissect_dcom_ActivationProperties function in epan/dissectors/packet-dcom-sysact.c in the DCOM ISystemActivator dissector in Wireshark 1.10.x before 1.10.1 allows remote attackers to cause a denial of service (memory consumption) via crafted packets." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8828", "refsource": "CONFIRM", "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8828" }, { "name": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=50094", "refsource": "CONFIRM", "url": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=50094" }, { "name": "54425", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/54425" }, { "name": "http://www.wireshark.org/docs/relnotes/wireshark-1.10.1.html", "refsource": "CONFIRM", "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.10.1.html" }, { "name": "GLSA-201308-05", "refsource": "GENTOO", "url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml" }, { "name": "https://www.wireshark.org/security/wnpa-sec-2013-44.html", "refsource": "CONFIRM", "url": "https://www.wireshark.org/security/wnpa-sec-2013-44.html" }, { "name": "54296", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/54296" }, { "name": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-dcom-sysact.c?r1=50094\u0026r2=50093\u0026pathrev=50094", "refsource": "CONFIRM", "url": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-dcom-sysact.c?r1=50094\u0026r2=50093\u0026pathrev=50094" }, { "name": "oval:org.mitre.oval:def:16731", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16731" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2013-4923", "datePublished": "2013-07-29T19:00:00", "dateReserved": "2013-07-26T00:00:00", "dateUpdated": "2024-08-06T16:59:41.120Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2013-4926 (GCVE-0-2013-4926)
Vulnerability from cvelistv5
Published
2013-07-29 19:00
Modified
2024-08-06 16:59
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
epan/dissectors/packet-dcom-sysact.c in the DCOM ISystemActivator dissector in Wireshark 1.10.x before 1.10.1 does not properly determine whether there is remaining packet data to process, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
References
URL | Tags | ||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:59:40.979Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8828" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-dcom-sysact.c?r1=50478\u0026r2=50477\u0026pathrev=50478" }, { "name": "54425", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/54425" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.10.1.html" }, { "name": "GLSA-201308-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.wireshark.org/security/wnpa-sec-2013-44.html" }, { "name": "oval:org.mitre.oval:def:17547", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17547" }, { "name": "54296", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/54296" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=50478" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-07-26T00:00:00", "descriptions": [ { "lang": "en", "value": "epan/dissectors/packet-dcom-sysact.c in the DCOM ISystemActivator dissector in Wireshark 1.10.x before 1.10.1 does not properly determine whether there is remaining packet data to process, which allows remote attackers to cause a denial of service (application crash) via a crafted packet." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8828" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-dcom-sysact.c?r1=50478\u0026r2=50477\u0026pathrev=50478" }, { "name": "54425", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/54425" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.10.1.html" }, { "name": "GLSA-201308-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.wireshark.org/security/wnpa-sec-2013-44.html" }, { "name": "oval:org.mitre.oval:def:17547", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17547" }, { "name": "54296", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/54296" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=50478" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2013-4926", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "epan/dissectors/packet-dcom-sysact.c in the DCOM ISystemActivator dissector in Wireshark 1.10.x before 1.10.1 does not properly determine whether there is remaining packet data to process, which allows remote attackers to cause a denial of service (application crash) via a crafted packet." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8828", "refsource": "CONFIRM", "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8828" }, { "name": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-dcom-sysact.c?r1=50478\u0026r2=50477\u0026pathrev=50478", "refsource": "CONFIRM", "url": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-dcom-sysact.c?r1=50478\u0026r2=50477\u0026pathrev=50478" }, { "name": "54425", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/54425" }, { "name": "http://www.wireshark.org/docs/relnotes/wireshark-1.10.1.html", "refsource": "CONFIRM", "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.10.1.html" }, { "name": "GLSA-201308-05", "refsource": "GENTOO", "url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml" }, { "name": "https://www.wireshark.org/security/wnpa-sec-2013-44.html", "refsource": "CONFIRM", "url": "https://www.wireshark.org/security/wnpa-sec-2013-44.html" }, { "name": "oval:org.mitre.oval:def:17547", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17547" }, { "name": "54296", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/54296" }, { "name": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=50478", "refsource": "CONFIRM", "url": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=50478" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2013-4926", "datePublished": "2013-07-29T19:00:00", "dateReserved": "2013-07-26T00:00:00", "dateUpdated": "2024-08-06T16:59:40.979Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2013-4075 (GCVE-0-2013-4075)
Vulnerability from cvelistv5
Published
2013-06-09 21:00
Modified
2024-08-06 16:30
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
epan/dissectors/packet-gmr1_bcch.c in the GMR-1 BCCH dissector in Wireshark 1.8.x before 1.8.8 does not properly initialize memory, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
References
URL | Tags | |||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:30:50.025Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2017:0631", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0631.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-gmr1_bcch.c?r1=44674\u0026r2=44673\u0026pathrev=44674" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.8.8.html" }, { "name": "53762", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/53762" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7664" }, { "name": "54425", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/54425" }, { "name": "GLSA-201308-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml" }, { "name": "openSUSE-SU-2013:1086", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00196.html" }, { "name": "DSA-2709", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2013/dsa-2709" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.wireshark.org/security/wnpa-sec-2013-33.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=44674" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8726" }, { "name": "oval:org.mitre.oval:def:16859", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16859" }, { "name": "openSUSE-SU-2013:1084", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00194.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-06-07T00:00:00", "descriptions": [ { "lang": "en", "value": "epan/dissectors/packet-gmr1_bcch.c in the GMR-1 BCCH dissector in Wireshark 1.8.x before 1.8.8 does not properly initialize memory, which allows remote attackers to cause a denial of service (application crash) via a crafted packet." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-01-04T19:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "RHSA-2017:0631", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2017-0631.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-gmr1_bcch.c?r1=44674\u0026r2=44673\u0026pathrev=44674" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.8.8.html" }, { "name": "53762", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/53762" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7664" }, { "name": "54425", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/54425" }, { "name": "GLSA-201308-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml" }, { "name": "openSUSE-SU-2013:1086", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00196.html" }, { "name": "DSA-2709", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2013/dsa-2709" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.wireshark.org/security/wnpa-sec-2013-33.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=44674" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8726" }, { "name": "oval:org.mitre.oval:def:16859", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16859" }, { "name": "openSUSE-SU-2013:1084", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00194.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2013-4075", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "epan/dissectors/packet-gmr1_bcch.c in the GMR-1 BCCH dissector in Wireshark 1.8.x before 1.8.8 does not properly initialize memory, which allows remote attackers to cause a denial of service (application crash) via a crafted packet." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "RHSA-2017:0631", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2017-0631.html" }, { "name": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-gmr1_bcch.c?r1=44674\u0026r2=44673\u0026pathrev=44674", "refsource": "CONFIRM", "url": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-gmr1_bcch.c?r1=44674\u0026r2=44673\u0026pathrev=44674" }, { "name": "http://www.wireshark.org/docs/relnotes/wireshark-1.8.8.html", "refsource": "CONFIRM", "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.8.8.html" }, { "name": "53762", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/53762" }, { "name": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7664", "refsource": "CONFIRM", "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7664" }, { "name": "54425", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/54425" }, { "name": "GLSA-201308-05", "refsource": "GENTOO", "url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml" }, { "name": "openSUSE-SU-2013:1086", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00196.html" }, { "name": "DSA-2709", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2013/dsa-2709" }, { "name": "http://www.wireshark.org/security/wnpa-sec-2013-33.html", "refsource": "CONFIRM", "url": "http://www.wireshark.org/security/wnpa-sec-2013-33.html" }, { "name": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=44674", "refsource": "CONFIRM", "url": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=44674" }, { "name": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8726", "refsource": "CONFIRM", "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8726" }, { "name": "oval:org.mitre.oval:def:16859", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16859" }, { "name": "openSUSE-SU-2013:1084", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00194.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2013-4075", "datePublished": "2013-06-09T21:00:00", "dateReserved": "2013-06-09T00:00:00", "dateUpdated": "2024-08-06T16:30:50.025Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2013-4078 (GCVE-0-2013-4078)
Vulnerability from cvelistv5
Published
2013-06-09 21:00
Modified
2024-08-06 16:30
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
epan/dissectors/packet-rdp.c in the RDP dissector in Wireshark 1.8.x before 1.8.8 does not validate return values during checks for data availability, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
References
URL | Tags | ||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:30:49.898Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.8.8.html" }, { "name": "53762", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/53762" }, { "name": "oval:org.mitre.oval:def:16936", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16936" }, { "name": "54425", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/54425" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=45566" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7862" }, { "name": "GLSA-201308-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8729" }, { "name": "openSUSE-SU-2013:1086", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00196.html" }, { "name": "DSA-2709", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2013/dsa-2709" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=46158" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.wireshark.org/security/wnpa-sec-2013-36.html" }, { "name": "openSUSE-SU-2013:1084", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00194.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-06-07T00:00:00", "descriptions": [ { "lang": "en", "value": "epan/dissectors/packet-rdp.c in the RDP dissector in Wireshark 1.8.x before 1.8.8 does not validate return values during checks for data availability, which allows remote attackers to cause a denial of service (application crash) via a crafted packet." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.8.8.html" }, { "name": "53762", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/53762" }, { "name": "oval:org.mitre.oval:def:16936", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16936" }, { "name": "54425", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/54425" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=45566" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7862" }, { "name": "GLSA-201308-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8729" }, { "name": "openSUSE-SU-2013:1086", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00196.html" }, { "name": "DSA-2709", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2013/dsa-2709" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=46158" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.wireshark.org/security/wnpa-sec-2013-36.html" }, { "name": "openSUSE-SU-2013:1084", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00194.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2013-4078", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "epan/dissectors/packet-rdp.c in the RDP dissector in Wireshark 1.8.x before 1.8.8 does not validate return values during checks for data availability, which allows remote attackers to cause a denial of service (application crash) via a crafted packet." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.wireshark.org/docs/relnotes/wireshark-1.8.8.html", "refsource": "CONFIRM", "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.8.8.html" }, { "name": "53762", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/53762" }, { "name": "oval:org.mitre.oval:def:16936", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16936" }, { "name": "54425", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/54425" }, { "name": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=45566", "refsource": "CONFIRM", "url": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=45566" }, { "name": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7862", "refsource": "CONFIRM", "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7862" }, { "name": "GLSA-201308-05", "refsource": "GENTOO", "url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml" }, { "name": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8729", "refsource": "CONFIRM", "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8729" }, { "name": "openSUSE-SU-2013:1086", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00196.html" }, { "name": "DSA-2709", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2013/dsa-2709" }, { "name": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=46158", "refsource": "CONFIRM", "url": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=46158" }, { "name": "http://www.wireshark.org/security/wnpa-sec-2013-36.html", "refsource": "CONFIRM", "url": "http://www.wireshark.org/security/wnpa-sec-2013-36.html" }, { "name": "openSUSE-SU-2013:1084", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00194.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2013-4078", "datePublished": "2013-06-09T21:00:00", "dateReserved": "2013-06-09T00:00:00", "dateUpdated": "2024-08-06T16:30:49.898Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2013-4079 (GCVE-0-2013-4079)
Vulnerability from cvelistv5
Published
2013-06-09 21:00
Modified
2024-08-06 16:30
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The dissect_schedule_message function in epan/dissectors/packet-gsm_cbch.c in the GSM CBCH dissector in Wireshark 1.8.x before 1.8.8 allows remote attackers to cause a denial of service (infinite loop and application hang) via a crafted packet.
References
URL | Tags | ||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:30:49.971Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.8.8.html" }, { "name": "53762", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/53762" }, { "name": "54425", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/54425" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8730" }, { "name": "GLSA-201308-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml" }, { "name": "openSUSE-SU-2013:1086", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00196.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-gsm_cbch.c?r1=49686\u0026r2=49685\u0026pathrev=49686" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=49686" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.wireshark.org/security/wnpa-sec-2013-37.html" }, { "name": "oval:org.mitre.oval:def:16691", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16691" }, { "name": "openSUSE-SU-2013:1084", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00194.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-06-07T00:00:00", "descriptions": [ { "lang": "en", "value": "The dissect_schedule_message function in epan/dissectors/packet-gsm_cbch.c in the GSM CBCH dissector in Wireshark 1.8.x before 1.8.8 allows remote attackers to cause a denial of service (infinite loop and application hang) via a crafted packet." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.8.8.html" }, { "name": "53762", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/53762" }, { "name": "54425", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/54425" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8730" }, { "name": "GLSA-201308-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml" }, { "name": "openSUSE-SU-2013:1086", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00196.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-gsm_cbch.c?r1=49686\u0026r2=49685\u0026pathrev=49686" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=49686" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.wireshark.org/security/wnpa-sec-2013-37.html" }, { "name": "oval:org.mitre.oval:def:16691", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16691" }, { "name": "openSUSE-SU-2013:1084", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00194.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2013-4079", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The dissect_schedule_message function in epan/dissectors/packet-gsm_cbch.c in the GSM CBCH dissector in Wireshark 1.8.x before 1.8.8 allows remote attackers to cause a denial of service (infinite loop and application hang) via a crafted packet." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.wireshark.org/docs/relnotes/wireshark-1.8.8.html", "refsource": "CONFIRM", "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.8.8.html" }, { "name": "53762", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/53762" }, { "name": "54425", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/54425" }, { "name": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8730", "refsource": "CONFIRM", "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8730" }, { "name": "GLSA-201308-05", "refsource": "GENTOO", "url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml" }, { "name": "openSUSE-SU-2013:1086", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00196.html" }, { "name": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-gsm_cbch.c?r1=49686\u0026r2=49685\u0026pathrev=49686", "refsource": "CONFIRM", "url": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-gsm_cbch.c?r1=49686\u0026r2=49685\u0026pathrev=49686" }, { "name": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=49686", "refsource": "CONFIRM", "url": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=49686" }, { "name": "http://www.wireshark.org/security/wnpa-sec-2013-37.html", "refsource": "CONFIRM", "url": "http://www.wireshark.org/security/wnpa-sec-2013-37.html" }, { "name": "oval:org.mitre.oval:def:16691", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16691" }, { "name": "openSUSE-SU-2013:1084", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00194.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2013-4079", "datePublished": "2013-06-09T21:00:00", "dateReserved": "2013-06-09T00:00:00", "dateUpdated": "2024-08-06T16:30:49.971Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-0405 (GCVE-0-2010-0405)
Vulnerability from cvelistv5
Published
2010-09-28 17:00
Modified
2024-08-07 00:45
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Integer overflow in the BZ2_decompress function in decompress.c in bzip2 and libbzip2 before 1.0.6 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted compressed file.
References
URL | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T00:45:12.275Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "USN-986-3", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-986-3" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://git.clamav.net/gitweb?p=clamav-devel.git%3Ba=blob_plain%3Bf=ChangeLog%3Bhb=clamav-0.96.3" }, { "name": "FEDORA-2010-17439", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051278.html" }, { "name": "USN-986-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/usn-986-1" }, { "name": "USN-986-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-986-2" }, { "name": "41452", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/41452" }, { "name": "42404", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/42404" }, { "name": "48378", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/48378" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://wwws.clamav.net/bugzilla/show_bug.cgi?id=2230" }, { "name": "ADV-2010-3073", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/3073" }, { "name": "ADV-2010-2455", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/2455" }, { "name": "APPLE-SA-2011-03-21-1", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html" }, { "name": "42530", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/42530" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://wwws.clamav.net/bugzilla/show_bug.cgi?id=2231" }, { "name": "[oss-security] 20100921 bzip2 CVE-2010-0405 integer overflow", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://marc.info/?l=oss-security\u0026m=128506868510655\u0026w=2" }, { "name": "42529", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/42529" }, { "name": "20101207 VMSA-2010-0019 VMware ESX third party updates for Service Console", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/515055/100/0/threaded" }, { "name": "41505", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/41505" }, { "name": "ADV-2010-3052", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/3052" }, { "name": "RHSA-2010:0703", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0703.html" }, { "name": "RHSA-2010:0858", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0858.html" }, { "name": "FEDORA-2010-1512", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051366.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://blogs.sun.com/security/entry/cve_2010_0405_integer_overflow" }, { "name": "42405", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/42405" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://xorl.wordpress.com/2010/09/21/cve-2010-0405-bzip2-integer-overflow/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=627882" }, { "name": "ADV-2010-3126", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/3126" }, { "name": "GLSA-201301-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201301-05.xml" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vmware.com/security/advisories/VMSA-2010-0019.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.bzip.org/" }, { "name": "ADV-2010-3127", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/3127" }, { "name": "ADV-2010-3043", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/3043" }, { "name": "SUSE-SR:2010:018", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00000.html" }, { "name": "42350", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/42350" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT4581" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-09-21T00:00:00", "descriptions": [ { "lang": "en", "value": "Integer overflow in the BZ2_decompress function in decompress.c in bzip2 and libbzip2 before 1.0.6 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted compressed file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "USN-986-3", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-986-3" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://git.clamav.net/gitweb?p=clamav-devel.git%3Ba=blob_plain%3Bf=ChangeLog%3Bhb=clamav-0.96.3" }, { "name": "FEDORA-2010-17439", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051278.html" }, { "name": "USN-986-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/usn-986-1" }, { "name": "USN-986-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-986-2" }, { "name": "41452", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/41452" }, { "name": "42404", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/42404" }, { "name": "48378", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/48378" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://wwws.clamav.net/bugzilla/show_bug.cgi?id=2230" }, { "name": "ADV-2010-3073", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/3073" }, { "name": "ADV-2010-2455", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/2455" }, { "name": "APPLE-SA-2011-03-21-1", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html" }, { "name": "42530", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/42530" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://wwws.clamav.net/bugzilla/show_bug.cgi?id=2231" }, { "name": "[oss-security] 20100921 bzip2 CVE-2010-0405 integer overflow", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://marc.info/?l=oss-security\u0026m=128506868510655\u0026w=2" }, { "name": "42529", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/42529" }, { "name": "20101207 VMSA-2010-0019 VMware ESX third party updates for Service Console", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/515055/100/0/threaded" }, { "name": "41505", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/41505" }, { "name": "ADV-2010-3052", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/3052" }, { "name": "RHSA-2010:0703", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0703.html" }, { "name": "RHSA-2010:0858", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0858.html" }, { "name": "FEDORA-2010-1512", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051366.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://blogs.sun.com/security/entry/cve_2010_0405_integer_overflow" }, { "name": "42405", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/42405" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://xorl.wordpress.com/2010/09/21/cve-2010-0405-bzip2-integer-overflow/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=627882" }, { "name": "ADV-2010-3126", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/3126" }, { "name": "GLSA-201301-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201301-05.xml" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vmware.com/security/advisories/VMSA-2010-0019.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.bzip.org/" }, { "name": "ADV-2010-3127", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/3127" }, { "name": "ADV-2010-3043", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/3043" }, { "name": "SUSE-SR:2010:018", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00000.html" }, { "name": "42350", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/42350" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT4581" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2010-0405", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Integer overflow in the BZ2_decompress function in decompress.c in bzip2 and libbzip2 before 1.0.6 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted compressed file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "USN-986-3", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-986-3" }, { "name": "http://git.clamav.net/gitweb?p=clamav-devel.git;a=blob_plain;f=ChangeLog;hb=clamav-0.96.3", "refsource": "CONFIRM", "url": "http://git.clamav.net/gitweb?p=clamav-devel.git;a=blob_plain;f=ChangeLog;hb=clamav-0.96.3" }, { "name": "FEDORA-2010-17439", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051278.html" }, { "name": "USN-986-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/usn-986-1" }, { "name": "USN-986-2", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-986-2" }, { "name": "41452", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/41452" }, { "name": "42404", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/42404" }, { "name": "48378", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/48378" }, { "name": "https://wwws.clamav.net/bugzilla/show_bug.cgi?id=2230", "refsource": "CONFIRM", "url": "https://wwws.clamav.net/bugzilla/show_bug.cgi?id=2230" }, { "name": "ADV-2010-3073", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/3073" }, { "name": "ADV-2010-2455", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/2455" }, { "name": "APPLE-SA-2011-03-21-1", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html" }, { "name": "42530", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/42530" }, { "name": "https://wwws.clamav.net/bugzilla/show_bug.cgi?id=2231", "refsource": "CONFIRM", "url": "https://wwws.clamav.net/bugzilla/show_bug.cgi?id=2231" }, { "name": "[oss-security] 20100921 bzip2 CVE-2010-0405 integer overflow", "refsource": "MLIST", "url": "http://marc.info/?l=oss-security\u0026m=128506868510655\u0026w=2" }, { "name": "42529", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/42529" }, { "name": "20101207 VMSA-2010-0019 VMware ESX third party updates for Service Console", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/515055/100/0/threaded" }, { "name": "41505", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/41505" }, { "name": "ADV-2010-3052", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/3052" }, { "name": "RHSA-2010:0703", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2010-0703.html" }, { "name": "RHSA-2010:0858", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2010-0858.html" }, { "name": "FEDORA-2010-1512", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051366.html" }, { "name": "http://blogs.sun.com/security/entry/cve_2010_0405_integer_overflow", "refsource": "CONFIRM", "url": "http://blogs.sun.com/security/entry/cve_2010_0405_integer_overflow" }, { "name": "42405", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/42405" }, { "name": "http://xorl.wordpress.com/2010/09/21/cve-2010-0405-bzip2-integer-overflow/", "refsource": "CONFIRM", "url": "http://xorl.wordpress.com/2010/09/21/cve-2010-0405-bzip2-integer-overflow/" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=627882", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=627882" }, { "name": "ADV-2010-3126", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/3126" }, { "name": "GLSA-201301-05", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-201301-05.xml" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2010-0019.html", "refsource": "CONFIRM", "url": "http://www.vmware.com/security/advisories/VMSA-2010-0019.html" }, { "name": "http://www.bzip.org/", "refsource": "CONFIRM", "url": "http://www.bzip.org/" }, { "name": "ADV-2010-3127", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/3127" }, { "name": "ADV-2010-3043", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2010/3043" }, { "name": "SUSE-SR:2010:018", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00000.html" }, { "name": "42350", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/42350" }, { "name": "http://support.apple.com/kb/HT4581", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT4581" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2010-0405", "datePublished": "2010-09-28T17:00:00", "dateReserved": "2010-01-27T00:00:00", "dateUpdated": "2024-08-07T00:45:12.275Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2013-4931 (GCVE-0-2013-4931)
Vulnerability from cvelistv5
Published
2013-07-29 19:00
Modified
2024-08-06 16:59
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
epan/proto.c in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 allows remote attackers to cause a denial of service (loop) via a crafted packet that is not properly handled by the GSM RR dissector.
References
URL | Tags | |||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:59:41.091Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "54371", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/54371" }, { "name": "openSUSE-SU-2013:1300", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00009.html" }, { "name": "RHSA-2014:0341", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0341.html" }, { "name": "54425", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/54425" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8923" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://anonsvn.wireshark.org/viewvc/trunk/epan/proto.c?r1=50504\u0026r2=50503\u0026pathrev=50504" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=50504" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.10.1.html" }, { "name": "GLSA-201308-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.wireshark.org/security/wnpa-sec-2013-49.html" }, { "name": "openSUSE-SU-2013:1295", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00004.html" }, { "name": "54296", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/54296" }, { "name": "oval:org.mitre.oval:def:17325", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17325" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.8.9.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-07-26T00:00:00", "descriptions": [ { "lang": "en", "value": "epan/proto.c in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 allows remote attackers to cause a denial of service (loop) via a crafted packet that is not properly handled by the GSM RR dissector." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "54371", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/54371" }, { "name": "openSUSE-SU-2013:1300", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00009.html" }, { "name": "RHSA-2014:0341", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0341.html" }, { "name": "54425", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/54425" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8923" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://anonsvn.wireshark.org/viewvc/trunk/epan/proto.c?r1=50504\u0026r2=50503\u0026pathrev=50504" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=50504" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.10.1.html" }, { "name": "GLSA-201308-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.wireshark.org/security/wnpa-sec-2013-49.html" }, { "name": "openSUSE-SU-2013:1295", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00004.html" }, { "name": "54296", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/54296" }, { "name": "oval:org.mitre.oval:def:17325", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17325" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.8.9.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2013-4931", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "epan/proto.c in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 allows remote attackers to cause a denial of service (loop) via a crafted packet that is not properly handled by the GSM RR dissector." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "54371", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/54371" }, { "name": "openSUSE-SU-2013:1300", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00009.html" }, { "name": "RHSA-2014:0341", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2014-0341.html" }, { "name": "54425", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/54425" }, { "name": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8923", "refsource": "CONFIRM", "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8923" }, { "name": "http://anonsvn.wireshark.org/viewvc/trunk/epan/proto.c?r1=50504\u0026r2=50503\u0026pathrev=50504", "refsource": "CONFIRM", "url": "http://anonsvn.wireshark.org/viewvc/trunk/epan/proto.c?r1=50504\u0026r2=50503\u0026pathrev=50504" }, { "name": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=50504", "refsource": "CONFIRM", "url": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=50504" }, { "name": "http://www.wireshark.org/docs/relnotes/wireshark-1.10.1.html", "refsource": "CONFIRM", "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.10.1.html" }, { "name": "GLSA-201308-05", "refsource": "GENTOO", "url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml" }, { "name": "https://www.wireshark.org/security/wnpa-sec-2013-49.html", "refsource": "CONFIRM", "url": "https://www.wireshark.org/security/wnpa-sec-2013-49.html" }, { "name": "openSUSE-SU-2013:1295", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00004.html" }, { "name": "54296", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/54296" }, { "name": "oval:org.mitre.oval:def:17325", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17325" }, { "name": "http://www.wireshark.org/docs/relnotes/wireshark-1.8.9.html", "refsource": "CONFIRM", "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.8.9.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2013-4931", "datePublished": "2013-07-29T19:00:00", "dateReserved": "2013-07-26T00:00:00", "dateUpdated": "2024-08-06T16:59:41.091Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2013-1944 (GCVE-0-2013-1944)
Vulnerability from cvelistv5
Published
2013-04-29 22:00
Modified
2024-08-06 15:20
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The tailMatch function in cookie.c in cURL and libcurl before 7.30.0 does not properly match the path domain when sending cookies, which allows remote attackers to steal cookies via a matching suffix in the domain of a URL.
References
URL | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T15:20:37.296Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html" }, { "name": "MDVSA-2013:151", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:151" }, { "name": "92316", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/92316" }, { "name": "DSA-2660", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2012/dsa-2660" }, { "name": "FEDORA-2013-6766", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104598.html" }, { "name": "USN-1801-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1801-1" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=950577" }, { "name": "FEDORA-2013-6780", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104207.html" }, { "name": "FEDORA-2013-5618", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102056.html" }, { "name": "FEDORA-2013-5598", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102711.html" }, { "name": "APPLE-SA-2013-10-22-3", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://curl.haxx.se/docs/adv_20130412.html" }, { "name": "openSUSE-SU-2013:0879", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00016.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0121" }, { "name": "59058", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/59058" }, { "name": "53044", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/53044" }, { "name": "RHSA-2013:0771", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-0771.html" }, { "name": "53051", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/53051" }, { "name": "FEDORA-2013-7813", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105539.html" }, { "name": "FEDORA-2013-7797", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106606.html" }, { "name": "53097", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/53097" }, { "name": "openSUSE-SU-2013:0876", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00013.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/bagder/curl/commit/2eb8dcf26cb37f09cffe26909a646e702dbcab66" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-04-10T00:00:00", "descriptions": [ { "lang": "en", "value": "The tailMatch function in cookie.c in cURL and libcurl before 7.30.0 does not properly match the path domain when sending cookies, which allows remote attackers to steal cookies via a matching suffix in the domain of a URL." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-09-07T14:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html" }, { "name": "MDVSA-2013:151", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:151" }, { "name": "92316", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/92316" }, { "name": "DSA-2660", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2012/dsa-2660" }, { "name": "FEDORA-2013-6766", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104598.html" }, { "name": "USN-1801-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1801-1" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=950577" }, { "name": "FEDORA-2013-6780", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104207.html" }, { "name": "FEDORA-2013-5618", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102056.html" }, { "name": "FEDORA-2013-5598", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102711.html" }, { "name": "APPLE-SA-2013-10-22-3", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://curl.haxx.se/docs/adv_20130412.html" }, { "name": "openSUSE-SU-2013:0879", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00016.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0121" }, { "name": "59058", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/59058" }, { "name": "53044", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/53044" }, { "name": "RHSA-2013:0771", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-0771.html" }, { "name": "53051", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/53051" }, { "name": "FEDORA-2013-7813", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105539.html" }, { "name": "FEDORA-2013-7797", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106606.html" }, { "name": "53097", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/53097" }, { "name": "openSUSE-SU-2013:0876", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00013.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/bagder/curl/commit/2eb8dcf26cb37f09cffe26909a646e702dbcab66" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-1944", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The tailMatch function in cookie.c in cURL and libcurl before 7.30.0 does not properly match the path domain when sending cookies, which allows remote attackers to steal cookies via a matching suffix in the domain of a URL." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html" }, { "name": "MDVSA-2013:151", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:151" }, { "name": "92316", "refsource": "OSVDB", "url": "http://www.osvdb.org/92316" }, { "name": "DSA-2660", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2012/dsa-2660" }, { "name": "FEDORA-2013-6766", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104598.html" }, { "name": "USN-1801-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-1801-1" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=950577", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=950577" }, { "name": "FEDORA-2013-6780", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104207.html" }, { "name": "FEDORA-2013-5618", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102056.html" }, { "name": "FEDORA-2013-5598", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102711.html" }, { "name": "APPLE-SA-2013-10-22-3", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html" }, { "name": "http://curl.haxx.se/docs/adv_20130412.html", "refsource": "CONFIRM", "url": "http://curl.haxx.se/docs/adv_20130412.html" }, { "name": "openSUSE-SU-2013:0879", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00016.html" }, { "name": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0121", "refsource": "MISC", "url": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0121" }, { "name": "59058", "refsource": "BID", "url": "http://www.securityfocus.com/bid/59058" }, { "name": "53044", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/53044" }, { "name": "RHSA-2013:0771", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2013-0771.html" }, { "name": "53051", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/53051" }, { "name": "FEDORA-2013-7813", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105539.html" }, { "name": "FEDORA-2013-7797", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106606.html" }, { "name": "53097", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/53097" }, { "name": "openSUSE-SU-2013:0876", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00013.html" }, { "name": "https://github.com/bagder/curl/commit/2eb8dcf26cb37f09cffe26909a646e702dbcab66", "refsource": "CONFIRM", "url": "https://github.com/bagder/curl/commit/2eb8dcf26cb37f09cffe26909a646e702dbcab66" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-1944", "datePublished": "2013-04-29T22:00:00", "dateReserved": "2013-02-19T00:00:00", "dateUpdated": "2024-08-06T15:20:37.296Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2013-4080 (GCVE-0-2013-4080)
Vulnerability from cvelistv5
Published
2013-06-09 21:00
Modified
2024-08-06 16:30
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The dissect_r3_upstreamcommand_queryconfig function in epan/dissectors/packet-assa_r3.c in the Assa Abloy R3 dissector in Wireshark 1.8.x before 1.8.8 does not properly handle a zero-length item, which allows remote attackers to cause a denial of service (infinite loop, and CPU and memory consumption) via a crafted packet.
References
URL | Tags | |||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:30:50.014Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.8.8.html" }, { "name": "53762", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/53762" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.wireshark.org/security/wnpa-sec-2013-38.html" }, { "name": "54425", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/54425" }, { "name": "oval:org.mitre.oval:def:16873", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16873" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8764" }, { "name": "GLSA-201308-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml" }, { "name": "openSUSE-SU-2013:1086", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00196.html" }, { "name": "60503", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/60503" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=49744" }, { "name": "openSUSE-SU-2013:1084", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00194.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-assa_r3.c?r1=49744\u0026r2=49743\u0026pathrev=49744" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-06-07T00:00:00", "descriptions": [ { "lang": "en", "value": "The dissect_r3_upstreamcommand_queryconfig function in epan/dissectors/packet-assa_r3.c in the Assa Abloy R3 dissector in Wireshark 1.8.x before 1.8.8 does not properly handle a zero-length item, which allows remote attackers to cause a denial of service (infinite loop, and CPU and memory consumption) via a crafted packet." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-18T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.8.8.html" }, { "name": "53762", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/53762" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.wireshark.org/security/wnpa-sec-2013-38.html" }, { "name": "54425", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/54425" }, { "name": "oval:org.mitre.oval:def:16873", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16873" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8764" }, { "name": "GLSA-201308-05", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml" }, { "name": "openSUSE-SU-2013:1086", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00196.html" }, { "name": "60503", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/60503" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=49744" }, { "name": "openSUSE-SU-2013:1084", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00194.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-assa_r3.c?r1=49744\u0026r2=49743\u0026pathrev=49744" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2013-4080", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The dissect_r3_upstreamcommand_queryconfig function in epan/dissectors/packet-assa_r3.c in the Assa Abloy R3 dissector in Wireshark 1.8.x before 1.8.8 does not properly handle a zero-length item, which allows remote attackers to cause a denial of service (infinite loop, and CPU and memory consumption) via a crafted packet." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.wireshark.org/docs/relnotes/wireshark-1.8.8.html", "refsource": "CONFIRM", "url": "http://www.wireshark.org/docs/relnotes/wireshark-1.8.8.html" }, { "name": "53762", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/53762" }, { "name": "http://www.wireshark.org/security/wnpa-sec-2013-38.html", "refsource": "CONFIRM", "url": "http://www.wireshark.org/security/wnpa-sec-2013-38.html" }, { "name": "54425", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/54425" }, { "name": "oval:org.mitre.oval:def:16873", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16873" }, { "name": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8764", "refsource": "CONFIRM", "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8764" }, { "name": "GLSA-201308-05", "refsource": "GENTOO", "url": "http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml" }, { "name": "openSUSE-SU-2013:1086", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00196.html" }, { "name": "60503", "refsource": "BID", "url": "http://www.securityfocus.com/bid/60503" }, { "name": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=49744", "refsource": "CONFIRM", "url": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=49744" }, { "name": "openSUSE-SU-2013:1084", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00194.html" }, { "name": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-assa_r3.c?r1=49744\u0026r2=49743\u0026pathrev=49744", "refsource": "CONFIRM", "url": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-assa_r3.c?r1=49744\u0026r2=49743\u0026pathrev=49744" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2013-4080", "datePublished": "2013-06-09T21:00:00", "dateReserved": "2013-06-09T00:00:00", "dateUpdated": "2024-08-06T16:30:50.014Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…