The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Computer vulnerabilities of Ethereal

Wireshark: buffer overflow via pcap-ng
An attacker can invite the victim to open a malicious pcap-ng file with Wireshark, in order to create an overflow, which leads to a denial of service and possibly to code execution...
671331, BID-46945, CVE-2011-0024, RHSA-2011:0370-01, VIGILANCE-VUL-10471
Wireshark 1.0: two vulnerabilities
Several vulnerabilities of Wireshark can be used by a remote attacker to create a denial of service or to execute code...
BID-42618, CVE-2010-2284, CVE-2010-2287, CVE-2010-2994, CVE-2010-2995, DSA-2101-1, FEDORA-2010-13416, FEDORA-2010-13427, MDVSA-2010:144, openSUSE-SU-2011:0010-1, openSUSE-SU-2011:0010-2, RHSA-2010:0625-01, SUSE-SR:2011:001, SUSE-SR:2011:002, SUSE-SR:2011:007, VIGILANCE-VUL-9799
Wireshark: several vulnerabilities
Several vulnerabilities of Wireshark can be used by a remote attacker to create a denial of service or to execute code...
4734, 4826, 4837, BID-40728, CERTA-2002-AVI-268, CERTA-2010-AVI-260, CVE-2010-2283, CVE-2010-2284, CVE-2010-2285, CVE-2010-2286, CVE-2010-2287, DSA-2066-1, FEDORA-2010-13416, FEDORA-2010-13427, MDVSA-2010:113, openSUSE-SU-2011:0010-1, openSUSE-SU-2011:0010-2, RHSA-2010:0625-01, SUSE-SR:2011:001, SUSE-SR:2011:002, SUSE-SR:2011:007, VIGILANCE-VUL-9700
Wireshark: denial of service via DOCSIS
An attacker can send a DOCSIS packet to a network captured by Wireshark, or invite the victim to open a capture containing a DOCSIS packet, in order to stop Wireshark...
BID-39950, CERTA-2010-AVI-200, CVE-2010-1455, FEDORA-2010-13416, FEDORA-2010-13427, MDVSA-2010:099, openSUSE-SU-2011:0010-1, openSUSE-SU-2011:0010-2, RHSA-2010:0625-01, SUSE-SR:2011:001, SUSE-SR:2011:002, SUSE-SR:2011:007, VIGILANCE-VUL-9630, wnpa-sec-2010-03, wnpa-sec-2010-04
Wireshark 1.2: denials of service
Several vulnerabilities of Wireshark 1.2 can be used by a remote attacker to create a denial of service...
BID-36846, CVE-2009-3549, CVE-2009-3550, CVE-2009-3551, MDVSA-2009:292, SUSE-SR:2009:020, VIGILANCE-VUL-9135
Wireshark: denials of service
Several vulnerabilities of Wireshark can be used by a remote attacker to create a denial of service...
BID-36408, BID-36591, CERTA-2009-AVI-388, CERTA-2009-AVI-394, CERTA-2010-AVI-035, CVE-2009-2562, CVE-2009-2563, CVE-2009-3241, CVE-2009-3243, CVE-2009-3829, DSA-1942-1, FEDORA-2009-7998, FEDORA-2009-9837, MDVSA-2009:270, MDVSA-2009:292, MDVSA-2009:292-1, RHSA-2010:0360-01, SUSE-SR:2009:016, SUSE-SR:2009:020, SUSE-SR:2010:007, VIGILANCE-VUL-9026, VU#676492, wnpa-sec-2009-05, wnpa-sec-2009-06
Wireshark: denials of service
Several vulnerabilities of Wireshark can be used by a remote attacker to create a denial of service, or to execute code...
BID-35748, CERTA-2009-AVI-286, CERTA-2009-AVI-388, CERTA-2009-AVI-394, CERTA-2009-AVI-463, CERTA-2010-AVI-035, CVE-2009-2559, CVE-2009-2560, CVE-2009-2561, CVE-2009-2562, CVE-2009-2563, DSA-1942-1, FEDORA-2009-7998, FEDORA-2009-9837, RHSA-2010:0360-01, SUSE-SR:2009:014, SUSE-SR:2009:020, SUSE-SR:2010:007, VIGILANCE-VUL-8875, wnpa-sec-2009-04
Wireshark: denial of service via PCNFSD
An attacker can send a malicious PCNFSD packet in order to stop Wireshark...
BID-35081, CVE-2009-1829, FEDORA-2009-5339, FEDORA-2009-5382, MDVSA-2009:125, RHSA-2009:1100-01, VIGILANCE-VUL-8730, wnpa-sec-2009-03
Wireshark: denials of service
Several vulnerabilities of Wireshark can be used by a remote attacker to create a denial of service...
BID-34457, CVE-2009-1267, CVE-2009-1268, CVE-2009-1269, DSA-1785-1, DSA-1942-1, FEDORA-2009-3599, MDVSA-2009:088, RHSA-2009:1100-01, SUSE-SR:2009:011, VIGILANCE-VUL-8616, wnpa-sec-2009-02
Wireshark: denial of service via PN-DCP
An attacker can send malicious PN-DCP data in order to create a denial of service or to execute code on Wireshark...
BID-34291, CERTA-2009-AVI-139, CVE-2009-1210, DSA-1785-1, FEDORA-2009-3599, RHSA-2009:1100-01, SUSE-SR:2009:011, VIGILANCE-VUL-8577, wnpa-sec-2009-02
Our database contains other pages. You can request a free trial to read them.