Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-mp4g-mxp3-v6g5

Опубликовано: 14 мая 2022
Источник: github
Github: Не прошло ревью

Описание

epan/dissectors/packet-afp.c in the AFP dissector in Wireshark 1.4.x before 1.4.15, 1.6.x before 1.6.10, and 1.8.x before 1.8.2 allows remote attackers to cause a denial of service (loop and CPU consumption) via a large number of ACL entries.

epan/dissectors/packet-afp.c in the AFP dissector in Wireshark 1.4.x before 1.4.15, 1.6.x before 1.6.10, and 1.8.x before 1.8.2 allows remote attackers to cause a denial of service (loop and CPU consumption) via a large number of ACL entries.

EPSS

Процентиль: 52%
0.00292
Низкий

Связанные уязвимости

ubuntu
почти 13 лет назад

epan/dissectors/packet-afp.c in the AFP dissector in Wireshark 1.4.x before 1.4.15, 1.6.x before 1.6.10, and 1.8.x before 1.8.2 allows remote attackers to cause a denial of service (loop and CPU consumption) via a large number of ACL entries.

redhat
почти 13 лет назад

epan/dissectors/packet-afp.c in the AFP dissector in Wireshark 1.4.x before 1.4.15, 1.6.x before 1.6.10, and 1.8.x before 1.8.2 allows remote attackers to cause a denial of service (loop and CPU consumption) via a large number of ACL entries.

nvd
почти 13 лет назад

epan/dissectors/packet-afp.c in the AFP dissector in Wireshark 1.4.x before 1.4.15, 1.6.x before 1.6.10, and 1.8.x before 1.8.2 allows remote attackers to cause a denial of service (loop and CPU consumption) via a large number of ACL entries.

debian
почти 13 лет назад

epan/dissectors/packet-afp.c in the AFP dissector in Wireshark 1.4.x b ...

oracle-oval
больше 12 лет назад

ELSA-2013-0125: wireshark security, bug fix, and enhancement update (MODERATE)

EPSS

Процентиль: 52%
0.00292
Низкий