epan/dissectors/packet-afp.c in the AFP dissector in Wireshark 1.4.x before 1.4.15, 1.6.x before 1.6.10, and 1.8.x before 1.8.2 allows remote attackers to cause a denial of service (loop and CPU consumption) via a large number of ACL entries.
Publish Date : 2012-08-16 Last Update Date : 2018-10-30
Title |
Definition Id |
Class |
Family |
DEPRECATED: ELSA-2013-0125 -- wireshark security, bug fix, and enhancement update (moderate) |
oval:org.mitre.oval:def:27311 |
|
unix |
ELSA-2013-1569 -- wireshark security, bug fix, and enhancement update (moderate) |
oval:org.mitre.oval:def:27258 |
|
unix |
ELSA-2013:0125: wireshark security, bug fix, and enhancement update (Moderate) |
oval:org.mitre.oval:def:23298 |
|
unix |
epan/dissectors/packet-afp.c in the AFP dissector in Wireshark 1.4.x before 1.4.15, 1.6.x before 1.6.10, and 1.8.x befor... |
oval:org.mitre.oval:def:14963 |
|
windows |
RHSA-2013:0125: wireshark security, bug fix, and enhancement update (Moderate) |
oval:org.mitre.oval:def:20890 |
|
unix |
RHSA-2013:0125: wireshark security, bug fix, and enhancement update (Moderate) |
oval:com.redhat.rhsa:def:20130125 |
|
unix |
RHSA-2013:1569 -- wireshark security, bug fix, and enhancement update (Moderate) |
oval:org.mitre.oval:def:26946 |
|
unix |
RHSA-2013:1569: wireshark security, bug fix, and enhancement update (Moderate) |
oval:com.redhat.rhsa:def:20131569 |
|
unix |
|
OVAL (Open Vulnerability and Assessment Language) definitions define exactly what should be done to verify
a vulnerability or a missing patch. Check out the OVAL definitions
if you want to learn what you should do to verify a vulnerability.