Vulnerability & Exploit Database

Displaying all 8 entries

Results for: CVE-2013-1578 Back to search

SUSE Linux Security Vulnerability: CVE-2013-4402 Vulnerability

  • Severity: 5
  • Published: October 28, 2013

The compressed packet parser in GnuPG 1.4.x before 1.4.15 and 2.0.x before 2.0.22 allows remote attackers to cause a denial of service (infinite recursion) via a crafted OpenPGP message.

SUSE Linux Security Vulnerability: CVE-2013-4351 Vulnerability

  • Severity: 6
  • Published: October 09, 2013

GnuPG 1.4.x, 2.0.x, and 2.1.x treats a key flags subpacket with all bits cleared (no usage permitted) as if it has all bits set (all usage permitted), which might allow remote attackers to bypass intended cryptographic protection mechanisms by leveraging the subkey.

SUSE Linux Security Vulnerability: CVE-2013-4242 Vulnerability

  • Severity: 2
  • Published: August 19, 2013

GnuPG before 1.4.14, and Libgcrypt before 1.5.3 as used in GnuPG 2.0.x and possibly other products, allows local users to obtain private RSA keys via a cache side-channel attack involving the L3 cache, aka Flush+Reload.

Wireshark : CVE-2013-1578 : Infinite and large loops in several dissectors Vulnerability

  • Severity: 3
  • Published: February 02, 2013

The dissect_pw_eth_heuristic function in epan/dissectors/packet-pw-eth.c in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly handle apparent Ethernet address values at the beginning of MPLS data, which allows remote attackers to cause a denial of service (loop) via a malformed packet.

SUSE Linux Security Vulnerability: CVE-2013-1578 Vulnerability

  • Severity: 3
  • Published: February 02, 2013

The dissect_pw_eth_heuristic function in epan/dissectors/packet-pw-eth.c in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly handle apparent Ethernet address values at the beginning of MPLS data, which allows remote attackers to cause a denial of service (loop) via a malformed packet.

Oracle Solaris 11: CVE-2013-1578 (11.1 SRU 7.5.0) Vulnerability

  • Severity: 3
  • Published: February 02, 2013

The dissect_pw_eth_heuristic function in epan/dissectors/packet-pw-eth.c in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly handle apparent Ethernet address values at the beginning of MPLS data, which allows remote attackers to cause a denial of service (loop) via a malformed packet.

Debian: CVE-2013-1578: wireshark - security update Vulnerability

  • Severity: 3
  • Published: February 02, 2013

The dissect_pw_eth_heuristic function in epan/dissectors/packet-pw-eth.c in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly handle apparent Ethernet address values at the beginning of MPLS data, which allows remote attackers to cause a denial of service (loop) via a malformed packet.

SUSE Linux Security Vulnerability: CVE-2012-6085 Vulnerability

  • Severity: 6
  • Published: January 23, 2013

The read_block function in g10/import.c in GnuPG 1.4.x before 1.4.13 and 2.0.x through 2.0.19, when importing a key, allows remote attackers to corrupt the public keyring database or cause a denial of service (application crash) via a crafted length field of an OpenPGP packet.