Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2016-9372

Опубликовано: 17 нояб. 2016
Источник: ubuntu
Приоритет: medium
CVSS2: 4.3
CVSS3: 5.9

Описание

In Wireshark 2.2.0 to 2.2.1, the Profinet I/O dissector could loop excessively, triggered by network traffic or a capture file. This was addressed in plugins/profinet/packet-pn-rtc-one.c by rejecting input with too many I/O objects.

РелизСтатусПримечание
artful

ignored

end of life
bionic

released

2.6.3-1~ubuntu18.04.1
devel

not-affected

2.6.3-1
esm-apps/bionic

released

2.6.3-1~ubuntu18.04.1
esm-apps/xenial

released

2.6.3-1~ubuntu16.04.1
esm-infra-legacy/trusty

released

2.6.3-1~ubuntu14.04.1
precise

not-affected

pre-2.2.0
precise/esm

DNE

precise was not-affected [pre-2.2.0]
trusty

released

2.6.3-1~ubuntu14.04.1
trusty/esm

released

2.6.3-1~ubuntu14.04.1

Показывать по

4.3 Medium

CVSS2

5.9 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.9
redhat
около 9 лет назад

In Wireshark 2.2.0 to 2.2.1, the Profinet I/O dissector could loop excessively, triggered by network traffic or a capture file. This was addressed in plugins/profinet/packet-pn-rtc-one.c by rejecting input with too many I/O objects.

CVSS3: 5.9
nvd
около 9 лет назад

In Wireshark 2.2.0 to 2.2.1, the Profinet I/O dissector could loop excessively, triggered by network traffic or a capture file. This was addressed in plugins/profinet/packet-pn-rtc-one.c by rejecting input with too many I/O objects.

CVSS3: 5.9
debian
около 9 лет назад

In Wireshark 2.2.0 to 2.2.1, the Profinet I/O dissector could loop exc ...

CVSS3: 5.9
github
больше 3 лет назад

In Wireshark 2.2.0 to 2.2.1, the Profinet I/O dissector could loop excessively, triggered by network traffic or a capture file. This was addressed in plugins/profinet/packet-pn-rtc-one.c by rejecting input with too many I/O objects.

suse-cvrf
около 9 лет назад

Security update for wireshark

4.3 Medium

CVSS2

5.9 Medium

CVSS3