Wireshark multiple vulnerabilities including buffer overflow and infinite loop
Reporter | Title | Published | Views | Family All 183 |
---|---|---|---|---|
![]() | FreeBSD : wireshark -- multiple vulnerabilities (8a835235-ae84-11dc-a5f9-001a4d49522b) | 24 Dec 200700:00 | – | nessus |
![]() | Debian DSA-1446-1 : wireshark - several vulnerabilities | 4 Jan 200800:00 | – | nessus |
![]() | Oracle Linux 5 : Moderate: / wireshark (ELSA-2008-0058) | 12 Jul 201300:00 | – | nessus |
![]() | Mandriva Linux Security Advisory : wireshark (MDVSA-2008:001-1) | 23 Apr 200900:00 | – | nessus |
![]() | GLSA-200712-23 : Wireshark: Multiple vulnerabilities | 31 Dec 200700:00 | – | nessus |
![]() | RHEL 4 / 5 : wireshark (RHSA-2008:0058) | 21 Jan 200800:00 | – | nessus |
![]() | CentOS 4 / 5 : wireshark (CESA-2008:0058) | 6 Jan 201000:00 | – | nessus |
![]() | Debian DSA-1414-1 : wireshark - several vulnerabilities | 29 Nov 200700:00 | – | nessus |
![]() | Fedora 8 : wireshark-0.99.7-2.fc8 (2007-4590) | 24 Dec 200700:00 | – | nessus |
![]() | Fedora 7 : wireshark-0.99.7-1.fc7 (2007-4690) | 24 Dec 200700:00 | – | nessus |
Source | Link |
---|---|
wireshark | www.wireshark.org/security/wnpa-sec-2007-03.html |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
FreeBSD | any | noarch | wireshark | 0.8.16 | UNKNOWN |
FreeBSD | any | noarch | wireshark | 0.99.7 | UNKNOWN |
FreeBSD | any | noarch | wireshark-lite | 0.8.16 | UNKNOWN |
FreeBSD | any | noarch | wireshark-lite | 0.99.7 | UNKNOWN |
FreeBSD | any | noarch | ethereal | 0.8.16 | UNKNOWN |
FreeBSD | any | noarch | ethereal | 0.99.7 | UNKNOWN |
FreeBSD | any | noarch | ethereal-lite | 0.8.16 | UNKNOWN |
FreeBSD | any | noarch | ethereal-lite | 0.99.7 | UNKNOWN |
FreeBSD | any | noarch | tethereal | 0.8.16 | UNKNOWN |
FreeBSD | any | noarch | tethereal | 0.99.7 | UNKNOWN |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo