![]() Misparsed NTP control assignments with empty values. SSL/TLS dissector incorrectly interprets length for status_request_v2 hello extension. Wrong decoding of RPKI RTR End of Data PDU. BGP4: Wireshark skipped some potion of AS_PATH. Ethernet OAM (CFM) frames including TLV’s are wrongly decoded as malformed. BTLE advertising header flags (RxAdd/TxAdd) dissected incorrectly. Mergecap wildcard breaks in version 1.12.0. Different dissection results for same file. ![]() wmem_alloc_array() "succeeds" (and clobbers memory) when requested to allocate 0xaaaaaaaa items of size 12. 802.11 BA sequence number decode is broken. Probably wrong length check in proto_item_set_end. MIPv6 Service Selection Identifier parse error. Extra quotes around date fields (FT_ABSOLUTE_TIME) when using -E quote=d or s. 802.11 capture does not decrypt/decode DHCP response. Wireshark can crash during remote capture (rpcap) configuration. ![]() wnpa-sec-2014-19: Sniffer file parser crash. wnpa-sec-2014-17: RTSP dissector crash. wnpa-sec-2014-16: HIP dissector infinite loop. ![]() wnpa-sec-2014-15: CUPS dissector crash. wnpa-sec-2014-14: Netflow dissector crash. wnpa-sec-2014-13: MEGACO dissector infinite loop. The following vulnerabilities have been fixed: ![]()
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |