Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2013-4931

Опубликовано: 30 июл. 2013
Источник: debian
EPSS Низкий

Описание

epan/proto.c in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 allows remote attackers to cause a denial of service (loop) via a crafted packet that is not properly handled by the GSM RR dissector.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
wiresharkfixed1.10.1-1package

Примечания

  • Not suitable for code injection

EPSS

Процентиль: 80%
0.01503
Низкий

Связанные уязвимости

ubuntu
почти 12 лет назад

epan/proto.c in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 allows remote attackers to cause a denial of service (loop) via a crafted packet that is not properly handled by the GSM RR dissector.

redhat
почти 12 лет назад

epan/proto.c in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 allows remote attackers to cause a denial of service (loop) via a crafted packet that is not properly handled by the GSM RR dissector.

nvd
почти 12 лет назад

epan/proto.c in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 allows remote attackers to cause a denial of service (loop) via a crafted packet that is not properly handled by the GSM RR dissector.

github
около 3 лет назад

epan/proto.c in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 allows remote attackers to cause a denial of service (loop) via a crafted packet that is not properly handled by the GSM RR dissector.

oracle-oval
около 11 лет назад

ELSA-2014-0341: wireshark security update (MODERATE)

EPSS

Процентиль: 80%
0.01503
Низкий