Vulnerabilities > Wireshark > Wireshark > 1.6.1
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2011-11-03 | CVE-2011-4100 | Resource Management Errors vulnerability in Wireshark 1.6.0/1.6.1/1.6.2 The csnStreamDissector function in epan/dissectors/packet-csn1.c in the CSN.1 dissector in Wireshark 1.6.x before 1.6.3 does not initialize a certain variable, which allows remote attackers to cause a denial of service (application crash) via a malformed packet. | 4.3 |
2011-09-20 | CVE-2011-3484 | Improper Input Validation vulnerability in Wireshark 1.6.0/1.6.1 The unxorFrame function in epan/dissectors/packet-opensafety.c in the OpenSafety dissector in Wireshark 1.6.x before 1.6.2 does not properly validate a certain frame size, which allows remote attackers to cause a denial of service (loop and application crash) via a malformed packet. | 4.3 |
2011-09-20 | CVE-2011-3483 | Buffer Errors vulnerability in Wireshark 1.6.0/1.6.1 Wireshark 1.6.x before 1.6.2 allows remote attackers to cause a denial of service (application crash) via a malformed capture file that leads to an invalid root tvbuff, related to a "buffer exception handling vulnerability." | 4.3 |
2011-09-20 | CVE-2011-3482 | Resource Management Errors vulnerability in Wireshark 1.6.0/1.6.1 The csnStreamDissector function in epan/dissectors/packet-csn1.c in the CSN.1 dissector in Wireshark 1.6.x before 1.6.2 does not initialize a certain structure member, which allows remote attackers to cause a denial of service (application crash) via a malformed packet. | 4.3 |
2011-09-20 | CVE-2011-3360 | Unspecified vulnerability in Wireshark Untrusted search path vulnerability in Wireshark 1.4.x before 1.4.9 and 1.6.x before 1.6.2 allows local users to gain privileges via a Trojan horse Lua script in an unspecified directory. | 9.3 |
2011-08-24 | CVE-2011-3266 | Resource Management Errors vulnerability in Wireshark The proto_tree_add_item function in Wireshark 1.6.0 through 1.6.1 and 1.4.0 through 1.4.8, when the IKEv1 protocol dissector is used, allows user-assisted remote attackers to cause a denial of service (infinite loop) via vectors involving a malformed IKE packet and many items in a tree. | 2.6 |