Refine your search
104 vulnerabilities found for Wireshark by Wireshark
CERTFR-2026-AVI-0211
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Wireshark. Elles permettent à un attaquant de provoquer un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Wireshark versions 4.4.x ant\u00e9rieures \u00e0 4.4.14",
"product": {
"name": "Wireshark",
"vendor": {
"name": "Wireshark",
"scada": false
}
}
},
{
"description": "Wireshark versions 4.6.x ant\u00e9rieures \u00e0 4.6.4",
"product": {
"name": "Wireshark",
"vendor": {
"name": "Wireshark",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2026-3201",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3201"
},
{
"name": "CVE-2026-3203",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3203"
},
{
"name": "CVE-2026-3202",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3202"
}
],
"initial_release_date": "2026-02-26T00:00:00",
"last_revision_date": "2026-02-26T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0211",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-02-26T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Wireshark. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Wireshark",
"vendor_advisories": [
{
"published_at": "2026-02-26",
"title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2026-07",
"url": "https://www.wireshark.org/security/wnpa-sec-2026-07.html"
},
{
"published_at": "2026-02-26",
"title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2026-06",
"url": "https://www.wireshark.org/security/wnpa-sec-2026-06.html"
},
{
"published_at": "2026-02-26",
"title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2026-05",
"url": "https://www.wireshark.org/security/wnpa-sec-2026-05.html"
}
]
}
CERTFR-2026-AVI-0048
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Wireshark. Elles permettent à un attaquant de provoquer un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Wireshark versions 4.6.x ant\u00e9rieures \u00e0 4.6.3",
"product": {
"name": "Wireshark",
"vendor": {
"name": "Wireshark",
"scada": false
}
}
},
{
"description": "Wireshark versions 4.4.x ant\u00e9rieures \u00e0 4.4.13",
"product": {
"name": "Wireshark",
"vendor": {
"name": "Wireshark",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [],
"initial_release_date": "2026-01-15T00:00:00",
"last_revision_date": "2026-01-15T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0048",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-01-15T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Wireshark. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Wireshark",
"vendor_advisories": [
{
"published_at": "2026-01-15",
"title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2026-02",
"url": "https://www.wireshark.org/security/wnpa-sec-2026-02.html"
},
{
"published_at": "2026-01-15",
"title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2026-03",
"url": "https://www.wireshark.org/security/wnpa-sec-2026-03.html"
},
{
"published_at": "2026-01-15",
"title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2026-04",
"url": "https://www.wireshark.org/security/wnpa-sec-2026-04.html"
},
{
"published_at": "2026-01-15",
"title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2026-01",
"url": "https://www.wireshark.org/security/wnpa-sec-2026-01.html"
}
]
}
CERTFR-2025-AVI-1062
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Wireshark. Elles permettent à un attaquant de provoquer un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Wireshark versions 4.4.x ant\u00e9rieures \u00e0 4.4.12",
"product": {
"name": "Wireshark",
"vendor": {
"name": "Wireshark",
"scada": false
}
}
},
{
"description": "Wireshark versions 4.6.x ant\u00e9rieures \u00e0 4.6.2",
"product": {
"name": "Wireshark",
"vendor": {
"name": "Wireshark",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-13946",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13946"
},
{
"name": "CVE-2025-13945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13945"
}
],
"initial_release_date": "2025-12-04T00:00:00",
"last_revision_date": "2025-12-04T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-1062",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-12-04T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Wireshark. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Wireshark",
"vendor_advisories": [
{
"published_at": "2025-12-04",
"title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2025-08",
"url": "https://www.wireshark.org/security/wnpa-sec-2025-08.html"
},
{
"published_at": "2025-12-04",
"title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2025-07",
"url": "https://www.wireshark.org/security/wnpa-sec-2025-07.html"
}
]
}
CERTFR-2025-AVI-1026
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Wireshark. Elles permettent à un attaquant de provoquer un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Wireshark versions 4.4.x ant\u00e9rieures \u00e0 4.4.11",
"product": {
"name": "Wireshark",
"vendor": {
"name": "Wireshark",
"scada": false
}
}
},
{
"description": "Wireshark versions 4.6.x ant\u00e9rieures \u00e0 4.6.1",
"product": {
"name": "Wireshark",
"vendor": {
"name": "Wireshark",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [],
"initial_release_date": "2025-11-20T00:00:00",
"last_revision_date": "2025-11-20T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-1026",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-11-20T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Wireshark. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Wireshark",
"vendor_advisories": [
{
"published_at": "2025-11-20",
"title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2025-06",
"url": "https://www.wireshark.org/security/wnpa-sec-2025-06.html"
},
{
"published_at": "2025-11-20",
"title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2025-05",
"url": "https://www.wireshark.org/security/wnpa-sec-2025-05.html"
}
]
}
CERTFR-2025-AVI-0857
Vulnerability from certfr_avis
Une vulnérabilité a été découverte dans Wireshark. Elle permet à un attaquant de provoquer un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Wireshark versions 4.2.x ant\u00e9rieures \u00e0 4.2.14",
"product": {
"name": "Wireshark",
"vendor": {
"name": "Wireshark",
"scada": false
}
}
},
{
"description": "Wireshark versions 4.4.x ant\u00e9rieures \u00e0 4.4.10",
"product": {
"name": "Wireshark",
"vendor": {
"name": "Wireshark",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [],
"initial_release_date": "2025-10-09T00:00:00",
"last_revision_date": "2025-10-09T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0857",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-10-09T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans Wireshark. Elle permet \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance.",
"title": "Vuln\u00e9rabilit\u00e9 dans Wireshark",
"vendor_advisories": [
{
"published_at": "2025-10-09",
"title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2025-04",
"url": "https://www.wireshark.org/security/wnpa-sec-2025-04.html"
}
]
}
CERTFR-2025-AVI-0741
Vulnerability from certfr_avis
Une vulnérabilité a été découverte dans Wireshark. Elle permet à un attaquant de provoquer un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Wireshark versions 4.4.x ant\u00e9rieures \u00e0 4.4.9",
"product": {
"name": "Wireshark",
"vendor": {
"name": "Wireshark",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [],
"initial_release_date": "2025-08-29T00:00:00",
"last_revision_date": "2025-08-29T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0741",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-08-29T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans Wireshark. Elle permet \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance.",
"title": "Vuln\u00e9rabilit\u00e9 dans Wireshark",
"vendor_advisories": [
{
"published_at": "2025-08-29",
"title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2025-03",
"url": "https://www.wireshark.org/security/wnpa-sec-2025-03.html"
}
]
}
CERTFR-2025-AVI-0478
Vulnerability from certfr_avis
Une vulnérabilité a été découverte dans Wireshark. Elle permet à un attaquant de provoquer un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Wireshark versions 4.4.x ant\u00e9rieures \u00e0 4.4.7",
"product": {
"name": "Wireshark",
"vendor": {
"name": "Wireshark",
"scada": false
}
}
},
{
"description": "Wireshark versions 4.2.x ant\u00e9rieures \u00e0 4.2.12",
"product": {
"name": "Wireshark",
"vendor": {
"name": "Wireshark",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-5601",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5601"
}
],
"initial_release_date": "2025-06-05T00:00:00",
"last_revision_date": "2025-06-05T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0478",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-06-05T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans Wireshark. Elle permet \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance.",
"title": "Vuln\u00e9rabilit\u00e9 dans Wireshark",
"vendor_advisories": [
{
"published_at": "2025-06-05",
"title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2025-02",
"url": "https://www.wireshark.org/security/wnpa-sec-2025-02.html"
}
]
}
CERTFR-2025-AVI-0145
Vulnerability from certfr_avis
Une vulnérabilité a été découverte dans Wireshark. Elle permet à un attaquant de provoquer un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Wireshark versions 4.2.x ant\u00e9rieures \u00e0 4.2.11",
"product": {
"name": "Wireshark",
"vendor": {
"name": "Wireshark",
"scada": false
}
}
},
{
"description": "Wireshark versions 4.4.x ant\u00e9rieures \u00e0 4.4.4",
"product": {
"name": "Wireshark",
"vendor": {
"name": "Wireshark",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-1492",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1492"
}
],
"initial_release_date": "2025-02-20T00:00:00",
"last_revision_date": "2025-02-20T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0145",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-02-20T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans Wireshark. Elle permet \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance.",
"title": "Vuln\u00e9rabilit\u00e9 dans Wireshark",
"vendor_advisories": [
{
"published_at": "2025-04-09",
"title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2025-01",
"url": "https://www.wireshark.org/security/wnpa-sec-2025-01.html"
}
]
}
CERTFR-2024-AVI-1008
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Wireshark. Elles permettent à un attaquant de provoquer un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Wireshark versions 4.4.x ant\u00e9rieures \u00e0 4.4.2",
"product": {
"name": "Wireshark",
"vendor": {
"name": "Wireshark",
"scada": false
}
}
},
{
"description": "Wireshark versions 4.2.x ant\u00e9rieures \u00e0 4.2.9",
"product": {
"name": "Wireshark",
"vendor": {
"name": "Wireshark",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [],
"initial_release_date": "2024-11-21T00:00:00",
"last_revision_date": "2024-11-21T00:00:00",
"links": [],
"reference": "CERTFR-2024-AVI-1008",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-11-21T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Wireshark. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Wireshark",
"vendor_advisories": [
{
"published_at": "2024-11-21",
"title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2024-14",
"url": "https://www.wireshark.org/security/wnpa-sec-2024-14.html"
},
{
"published_at": "2024-11-21",
"title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2024-15",
"url": "https://www.wireshark.org/security/wnpa-sec-2024-15.html"
}
]
}
CERTFR-2024-AVI-0861
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Wireshark. Elles permettent à un attaquant de provoquer un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Wireshark versions 4.2.x ant\u00e9rieures \u00e0 4.2.8",
"product": {
"name": "Wireshark",
"vendor": {
"name": "Wireshark",
"scada": false
}
}
},
{
"description": "Wireshark versions 4.0.x ant\u00e9rieures \u00e0 4.0.1",
"product": {
"name": "Wireshark",
"vendor": {
"name": "Wireshark",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [],
"initial_release_date": "2024-10-10T00:00:00",
"last_revision_date": "2024-10-10T00:00:00",
"links": [],
"reference": "CERTFR-2024-AVI-0861",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-10-10T00:00:00.000000"
},
{
"description": "Correction de l\u0027\u00e9diteur, les versions 4.4.x sont affect\u00e9es, et non les versions 4.0.x",
"revision_date": "2024-10-10T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Wireshark. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Wireshark",
"vendor_advisories": [
{
"published_at": "2024-10-10",
"title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2024-13",
"url": "https://www.wireshark.org/security/wnpa-sec-2024-13.html"
},
{
"published_at": "2024-10-10",
"title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2024-12",
"url": "https://www.wireshark.org/security/wnpa-sec-2024-12.html"
}
]
}
CERTFR-2024-AVI-0568
Vulnerability from certfr_avis
Une vulnérabilité a été découverte dans Wireshark. Elle permet à un attaquant de provoquer un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Wireshark versions 4.0.x ant\u00e9rieures \u00e0 4.0.16",
"product": {
"name": "Wireshark",
"vendor": {
"name": "Wireshark",
"scada": false
}
}
},
{
"description": "Wireshark versions 4.2.x ant\u00e9rieures \u00e0 4.2.6",
"product": {
"name": "Wireshark",
"vendor": {
"name": "Wireshark",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [],
"initial_release_date": "2024-07-11T00:00:00",
"last_revision_date": "2024-07-11T00:00:00",
"links": [],
"reference": "CERTFR-2024-AVI-0568",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-07-11T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans Wireshark. Elle permet \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance.",
"title": "Vuln\u00e9rabilit\u00e9 dans Wireshark",
"vendor_advisories": [
{
"published_at": "2024-07-11",
"title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2024-10",
"url": "https://www.wireshark.org/security/wnpa-sec-2024-10.html"
}
]
}
CERTFR-2024-AVI-0411
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Wireshark. Elles permettent à un attaquant de provoquer un déni de service.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Wireshark versions 3.6.x ant\u00e9rieures \u00e0 3.6.23",
"product": {
"name": "Wireshark",
"vendor": {
"name": "Wireshark",
"scada": false
}
}
},
{
"description": "Wireshark versions 4.2.x ant\u00e9rieures \u00e0 4.2.5",
"product": {
"name": "Wireshark",
"vendor": {
"name": "Wireshark",
"scada": false
}
}
},
{
"description": "Wireshark versions 4.0.x ant\u00e9rieures \u00e0 4.0.15",
"product": {
"name": "Wireshark",
"vendor": {
"name": "Wireshark",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2024-4855",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4855"
},
{
"name": "CVE-2024-4853",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4853"
},
{
"name": "CVE-2024-4854",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4854"
}
],
"initial_release_date": "2024-05-16T00:00:00",
"last_revision_date": "2024-05-16T00:00:00",
"links": [],
"reference": "CERTFR-2024-AVI-0411",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-05-16T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits Wireshark\u003c/span\u003e. Elles permettent \u00e0 un\nattaquant de provoquer un d\u00e9ni de service.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Wireshark",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2024-09 du 16 mai 2024",
"url": "https://www.wireshark.org/security/wnpa-sec-2024-09.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2024-08 du 16 mai 2024",
"url": "https://www.wireshark.org/security/wnpa-sec-2024-08.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2024-07 du 16 mai 2024",
"url": "https://www.wireshark.org/security/wnpa-sec-2024-07.html"
}
]
}
CERTFR-2024-AVI-0256
Vulnerability from certfr_avis
Une vulnérabilité a été découverte dans Wireshark. Elle permet à un attaquant de provoquer un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Wireshark versions 4.0.x ant\u00e9rieures \u00e0 4.0.14",
"product": {
"name": "Wireshark",
"vendor": {
"name": "Wireshark",
"scada": false
}
}
},
{
"description": "Wireshark versions 4.2.x ant\u00e9rieures \u00e0 4.2.4",
"product": {
"name": "Wireshark",
"vendor": {
"name": "Wireshark",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2024-2955",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2955"
}
],
"initial_release_date": "2024-03-28T00:00:00",
"last_revision_date": "2024-03-28T00:00:00",
"links": [],
"reference": "CERTFR-2024-AVI-0256",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-03-28T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans Wireshark. Elle permet \u00e0 un\nattaquant de provoquer un d\u00e9ni de service \u00e0 distance.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans Wireshark",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2024-06 du 27 mars 2024",
"url": "https://www.wireshark.org/security/wnpa-sec-2024-06.html"
}
]
}
CERTFR-2024-AVI-0007
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Wireshark. Elles permettent à un attaquant de provoquer un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |
|---|---|---|---|
|
|
|||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Wireshark versions 4.0.x ant\u00e9rieures \u00e0 4.0.12",
"product": {
"name": "Wireshark",
"vendor": {
"name": "Wireshark",
"scada": false
}
}
},
{
"description": "Wireshark versions 3.6.x ant\u00e9rieures \u00e0 3.6.20",
"product": {
"name": "Wireshark",
"vendor": {
"name": "Wireshark",
"scada": false
}
}
},
{
"description": "Wireshark versions 4.2.x ant\u00e9rieures \u00e0 4.2.1",
"product": {
"name": "Wireshark",
"vendor": {
"name": "Wireshark",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2024-0209",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0209"
},
{
"name": "CVE-2024-0208",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0208"
},
{
"name": "CVE-2024-0207",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0207"
},
{
"name": "CVE-2024-0210",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0210"
}
],
"initial_release_date": "2024-01-05T00:00:00",
"last_revision_date": "2024-01-05T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2024-03 du 04 janvier 2024",
"url": "https://www.wireshark.org/security/wnpa-sec-2024-03.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2024-01 du 04 janvier 2024",
"url": "https://www.wireshark.org/security/wnpa-sec-2024-01.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2024-02 du 04 janvier 2024",
"url": "https://www.wireshark.org/security/wnpa-sec-2024-02.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2024-04 du 04 janvier 2024",
"url": "https://www.wireshark.org/security/wnpa-sec-2024-04.html"
}
],
"reference": "CERTFR-2024-AVI-0007",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-01-05T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits Wireshark\u003c/span\u003e. Elles permettent \u00e0 un\nattaquant de provoquer un d\u00e9ni de service \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Wireshark",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2024-02 du 03 janvier 2024",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2024-04 du 03 janvier 2024",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2024-01 du 03 janvier 2024",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2024-03 du 03 janvier 2024",
"url": null
}
]
}
CERTFR-2024-AVI-0005
Vulnerability from certfr_avis
Une vulnérabilité a été découverte dans Wireshark. Elle permet à un attaquant de provoquer un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Wireshark versions ant\u00e9rieures \u00e0 4.2.1",
"product": {
"name": "Wireshark",
"vendor": {
"name": "Wireshark",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2024-0211",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0211"
}
],
"initial_release_date": "2024-01-04T00:00:00",
"last_revision_date": "2024-01-04T00:00:00",
"links": [],
"reference": "CERTFR-2024-AVI-0005",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-01-04T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans \u003cspan\nclass=\"textit\"\u003eWireshark\u003c/span\u003e. Elle permet \u00e0 un attaquant de provoquer\nun d\u00e9ni de service \u00e0 distance.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans Wireshark",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2024-05 du 03 janvier 2024",
"url": "https://www.wireshark.org/security/wnpa-sec-2024-05.html"
}
]
}
CERTFR-2023-AVI-0949
Vulnerability from certfr_avis
Une vulnérabilité a été découverte dans Wireshark NetScreen file parser. Elle permet à un attaquant de provoquer un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Wireshark NetScreen file parser versions 3.6.x ant\u00e9rieures \u00e0 3.6.19",
"product": {
"name": "Wireshark",
"vendor": {
"name": "Wireshark",
"scada": false
}
}
},
{
"description": "Wireshark NetScreen file parser versions 4.0.x ant\u00e9rieures \u00e0 4.0.11",
"product": {
"name": "Wireshark",
"vendor": {
"name": "Wireshark",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-6175",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6175"
}
],
"initial_release_date": "2023-11-16T00:00:00",
"last_revision_date": "2023-11-16T00:00:00",
"links": [],
"reference": "CERTFR-2023-AVI-0949",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-11-16T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans \u003cspan class=\"textit\"\u003eWireshark\nNetScreen file parser\u003c/span\u003e. Elle permet \u00e0 un attaquant de provoquer un\nd\u00e9ni de service \u00e0 distance.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans Wireshark NetScreen file parser",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2023-29 du 16 novembre 2023",
"url": "https://www.wireshark.org/security/wnpa-sec-2023-29.html"
}
]
}
CERTFR-2023-AVI-0808
Vulnerability from certfr_avis
Une vulnérabilité a été découverte dans Wireshark. Elle permet à un attaquant de provoquer un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Wireshark versions 4.x ant\u00e9rieures \u00e0 4.0.9",
"product": {
"name": "Wireshark",
"vendor": {
"name": "Wireshark",
"scada": false
}
}
},
{
"description": "Wireshark versions 3.x ant\u00e9rieures \u00e0 3.6.17",
"product": {
"name": "Wireshark",
"vendor": {
"name": "Wireshark",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-5371",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5371"
}
],
"initial_release_date": "2023-10-05T00:00:00",
"last_revision_date": "2023-10-05T00:00:00",
"links": [],
"reference": "CERTFR-2023-AVI-0808",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-10-05T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans \u003cspan\nclass=\"textit\"\u003eWireshark\u003c/span\u003e. Elle permet \u00e0 un attaquant de provoquer\nun d\u00e9ni de service \u00e0 distance.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans Wireshark",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2023-27 du 05 octobre 2023",
"url": "https://www.wireshark.org/security/wnpa-sec-2023-27.html"
}
]
}
CERTFR-2023-AVI-0678
Vulnerability from certfr_avis
Une vulnérabilité a été découverte dans Wireshark. Elle permet à un attaquant de provoquer un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Wireshark versions 4.0.x ant\u00e9rieures \u00e0 4.0.8",
"product": {
"name": "Wireshark",
"vendor": {
"name": "Wireshark",
"scada": false
}
}
},
{
"description": "Wireshark versions 3.6.x ant\u00e9rieures \u00e0 3.6.16",
"product": {
"name": "Wireshark",
"vendor": {
"name": "Wireshark",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [],
"initial_release_date": "2023-08-24T00:00:00",
"last_revision_date": "2023-08-24T00:00:00",
"links": [],
"reference": "CERTFR-2023-AVI-0678",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-08-24T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans Wireshark. Elle permet \u00e0 un\nattaquant de provoquer un d\u00e9ni de service \u00e0 distance.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans Wireshark",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2023-26 du 23 ao\u00fbt 2023",
"url": "https://www.wireshark.org/security/wnpa-sec-2023-26.html"
}
]
}
CERTFR-2023-AVI-0539
Vulnerability from certfr_avis
Une vulnérabilité a été découverte dans Wireshark. Elle permet à un attaquant de provoquer un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Wireshark versions 4.0.x ant\u00e9rieures \u00e0 4.0.7",
"product": {
"name": "Wireshark",
"vendor": {
"name": "Wireshark",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [],
"initial_release_date": "2023-07-13T00:00:00",
"last_revision_date": "2023-07-13T00:00:00",
"links": [],
"reference": "CERTFR-2023-AVI-0539",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-07-13T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans \u003cspan\nclass=\"textit\"\u003eWireshark\u003c/span\u003e. Elle permet \u00e0 un attaquant de provoquer\nun d\u00e9ni de service \u00e0 distance.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans Wireshark",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2023-22 du 13 juillet 2023",
"url": "https://www.wireshark.org/security/wnpa-sec-2023-22.html"
}
]
}
CERTFR-2023-AVI-0409
Vulnerability from certfr_avis
Une vulnérabilité a été découverte dans Wireshark. Elle permet à un attaquant de provoquer un déni de service.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Wireshark versions 4.0.x ant\u00e9rieures \u00e0 4.0.6",
"product": {
"name": "Wireshark",
"vendor": {
"name": "Wireshark",
"scada": false
}
}
},
{
"description": "Wireshark versions 3.6.x ant\u00e9rieures \u00e0 3.6.14",
"product": {
"name": "Wireshark",
"vendor": {
"name": "Wireshark",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [],
"initial_release_date": "2023-05-25T00:00:00",
"last_revision_date": "2023-05-25T00:00:00",
"links": [],
"reference": "CERTFR-2023-AVI-0409",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-05-25T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans \u003cspan\nclass=\"textit\"\u003eWireshark\u003c/span\u003e. Elle permet \u00e0 un attaquant de provoquer\nun d\u00e9ni de service.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans Wireshark",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2023-20 du 24 mai 2023",
"url": "https://www.wireshark.org/security/wnpa-sec-2023-20.html"
}
]
}
CERTFR-2023-AVI-0312
Vulnerability from certfr_avis
Une vulnérabilité a été découverte dans Wireshark. Elle permet à un attaquant de provoquer un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Wireshark versions 4.0.x ant\u00e9rieures \u00e0 4.0.5",
"product": {
"name": "Wireshark",
"vendor": {
"name": "Wireshark",
"scada": false
}
}
},
{
"description": "Wireshark versions 3.6.x ant\u00e9rieures \u00e0 3.6.13",
"product": {
"name": "Wireshark",
"vendor": {
"name": "Wireshark",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-1994",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1994"
}
],
"initial_release_date": "2023-04-13T00:00:00",
"last_revision_date": "2023-04-13T00:00:00",
"links": [],
"reference": "CERTFR-2023-AVI-0312",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-04-13T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans Wireshark. Elle permet \u00e0 un\nattaquant de provoquer un d\u00e9ni de service \u00e0 distance.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans Wireshark",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2023-11 du 12 avril 2023",
"url": "https://www.wireshark.org/security/wnpa-sec-2023-11.html"
}
]
}
CERTFR-2023-AVI-0191
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Wireshark. Elles permettent à un attaquant de provoquer un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Wireshark versions 4.0.x ant\u00e9rieures \u00e0 4.0.4",
"product": {
"name": "Wireshark",
"vendor": {
"name": "Wireshark",
"scada": false
}
}
},
{
"description": "Wireshark versions 3.6.x ant\u00e9rieures \u00e0 3.6.12",
"product": {
"name": "Wireshark",
"vendor": {
"name": "Wireshark",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-1161",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1161"
}
],
"initial_release_date": "2023-03-03T00:00:00",
"last_revision_date": "2023-03-07T00:00:00",
"links": [],
"reference": "CERTFR-2023-AVI-0191",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-03-03T00:00:00.000000"
},
{
"description": "Correction erreur sur les versions 3.6.x",
"revision_date": "2023-03-06T00:00:00.000000"
},
{
"description": "Ajout du num\u00e9ro de CVE",
"revision_date": "2023-03-07T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Wireshark. Elles\npermettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Wireshark",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2023-08 du 02 mars 2023",
"url": "https://www.wireshark.org/security/wnpa-sec-2023-08.html"
}
]
}
CERTFR-2023-AVI-0042
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Wireshark. Elles permettent à un attaquant de provoquer un déni de service à distance et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Wireshark versions 4.0.x ant\u00e9rieures \u00e0 4.0.3",
"product": {
"name": "Wireshark",
"vendor": {
"name": "Wireshark",
"scada": false
}
}
},
{
"description": "Wireshark versions 3.6.x ant\u00e9rieures \u00e0 3.6.11",
"product": {
"name": "Wireshark",
"vendor": {
"name": "Wireshark",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [],
"initial_release_date": "2023-01-19T00:00:00",
"last_revision_date": "2023-01-19T00:00:00",
"links": [],
"reference": "CERTFR-2023-AVI-0042",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-01-19T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Wireshark. Elles\npermettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance et\nune atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Wireshark",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2023-03 du 18 janvier 2023",
"url": "https://www.wireshark.org/security/wnpa-sec-2023-03.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2023-07 du 18 janvier 2023",
"url": "https://www.wireshark.org/security/wnpa-sec-2023-07.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2023-05 du 18 janvier 2023",
"url": "https://www.wireshark.org/security/wnpa-sec-2023-05.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2023-02 du 18 janvier 2023",
"url": "https://www.wireshark.org/security/wnpa-sec-2023-02.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2023-04 du 18 janvier 2023",
"url": "https://www.wireshark.org/security/wnpa-sec-2023-04.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2023-06 du 18 janvier 2023",
"url": "https://www.wireshark.org/security/wnpa-sec-2023-06.html"
}
]
}
CERTFR-2022-AVI-1082
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Wireshark. Elles permettent à un attaquant de provoquer un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Wireshark versions 3.6.x ant\u00e9rieures \u00e0 3.6.10",
"product": {
"name": "Wireshark",
"vendor": {
"name": "Wireshark",
"scada": false
}
}
},
{
"description": "Wireshark versions 4.0.x ant\u00e9rieures \u00e0 4.0.2",
"product": {
"name": "Wireshark",
"vendor": {
"name": "Wireshark",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [],
"initial_release_date": "2022-12-08T00:00:00",
"last_revision_date": "2022-12-08T00:00:00",
"links": [],
"reference": "CERTFR-2022-AVI-1082",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-12-08T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Wireshark. Elles\npermettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Wireshark",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2022-09 du 07 d\u00e9cembre 2022",
"url": "https://www.wireshark.org/security/wnpa-sec-2022-09.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2022-10 du 07 d\u00e9cembre 2022",
"url": "https://www.wireshark.org/security/wnpa-sec-2022-10.html"
}
]
}
CERTFR-2022-AVI-958
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Wireshark. Elles permettent à un attaquant de provoquer un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Wireshark versions 3.6.x ant\u00e9rieures \u00e0 3.6.9",
"product": {
"name": "Wireshark",
"vendor": {
"name": "Wireshark",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [],
"initial_release_date": "2022-10-27T00:00:00",
"last_revision_date": "2022-10-27T00:00:00",
"links": [],
"reference": "CERTFR-2022-AVI-958",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-10-27T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Wireshark. Elles\npermettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Wireshark",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2022-08 du 26 octobre 2022",
"url": "https://www.wireshark.org/security/wnpa-sec-2022-08.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2022-07 du 26 octobre 2022",
"url": "https://www.wireshark.org/security/wnpa-sec-2022-07.html"
}
]
}
CERTFR-2022-AVI-803
Vulnerability from certfr_avis
Une vulnérabilité a été découverte dans Wireshark. Elle permet à un attaquant de provoquer un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Wireshark versions 3.6.x ant\u00e9rieures \u00e0 3.6.8",
"product": {
"name": "Wireshark",
"vendor": {
"name": "Wireshark",
"scada": false
}
}
},
{
"description": "Wireshark versions 3.4.x ant\u00e9rieures \u00e0 3.4.16",
"product": {
"name": "Wireshark",
"vendor": {
"name": "Wireshark",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [],
"initial_release_date": "2022-09-08T00:00:00",
"last_revision_date": "2022-09-08T00:00:00",
"links": [],
"reference": "CERTFR-2022-AVI-803",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-09-08T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans Wireshark. Elle permet \u00e0 un\nattaquant de provoquer un d\u00e9ni de service \u00e0 distance.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans Wireshark",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2022-06 du 07 septembre 2022",
"url": "https://www.wireshark.org/security/wnpa-sec-2022-06.html"
}
]
}
CERTFR-2022-AVI-139
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Wireshark. Elles permettent à un attaquant de provoquer un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Wireshark versions 3.4.x ant\u00e9rieures \u00e0 3.4.12",
"product": {
"name": "Wireshark",
"vendor": {
"name": "Wireshark",
"scada": false
}
}
},
{
"description": "Wireshark versions 3.6.x ant\u00e9rieures \u00e0 3.6.2",
"product": {
"name": "Wireshark",
"vendor": {
"name": "Wireshark",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [],
"initial_release_date": "2022-02-11T00:00:00",
"last_revision_date": "2022-02-11T00:00:00",
"links": [],
"reference": "CERTFR-2022-AVI-139",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-02-11T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Wireshark. Elles\npermettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Wireshark",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2022-01 du 10 f\u00e9vrier 2022",
"url": "https://www.wireshark.org/security/wnpa-sec-2022-01.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2022-03 du 10 f\u00e9vrier 2022",
"url": "https://www.wireshark.org/security/wnpa-sec-2022-03.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2022-05 du 10 f\u00e9vrier 2022",
"url": "https://www.wireshark.org/security/wnpa-sec-2022-05.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2022-04 du 10 f\u00e9vrier 2022",
"url": "https://www.wireshark.org/security/wnpa-sec-2022-04.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2022-02 du 10 f\u00e9vrier 2022",
"url": "https://www.wireshark.org/security/wnpa-sec-2022-02.html"
}
]
}
CERTFR-2021-AVI-989
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Wireshark. Elles permettent à un attaquant de provoquer un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Wireshark versions 3.6.x ant\u00e9rieures \u00e0 3.6.1",
"product": {
"name": "Wireshark",
"vendor": {
"name": "Wireshark",
"scada": false
}
}
},
{
"description": "Wireshark versions 3.4.x ant\u00e9rieures \u00e0 3.4.11",
"product": {
"name": "Wireshark",
"vendor": {
"name": "Wireshark",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-4182",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4182"
},
{
"name": "CVE-2021-4181",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4181"
},
{
"name": "CVE-2021-4185",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4185"
},
{
"name": "CVE-2021-4184",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4184"
},
{
"name": "CVE-2021-4186",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4186"
},
{
"name": "CVE-2021-4183",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4183"
}
],
"initial_release_date": "2021-12-30T00:00:00",
"last_revision_date": "2021-12-30T00:00:00",
"links": [],
"reference": "CERTFR-2021-AVI-989",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-12-30T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Wireshark. Elles\npermettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Wireshark",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2021-16 du 29 d\u00e9cembre 2021",
"url": "https://www.wireshark.org/security/wnpa-sec-2021-16.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2021-19 du 29 d\u00e9cembre 2021",
"url": "https://www.wireshark.org/security/wnpa-sec-2021-19.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2021-18 du 29 d\u00e9cembre 2021",
"url": "https://www.wireshark.org/security/wnpa-sec-2021-18.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2021-17 du 29 d\u00e9cembre 2021",
"url": "https://www.wireshark.org/security/wnpa-sec-2021-17.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2021-22 du 29 d\u00e9cembre 2021",
"url": "https://www.wireshark.org/security/wnpa-sec-2021-22.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2021-20 du 29 d\u00e9cembre 2021",
"url": "https://www.wireshark.org/security/wnpa-sec-2021-20.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2021-21 du 29 d\u00e9cembre 2021",
"url": "https://www.wireshark.org/security/wnpa-sec-2021-21.html"
}
]
}
CERTFR-2021-AVI-882
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Wireshark. Elles permettent à un attaquant de provoquer un déni de service.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Wireshark versions 3.2.x ant\u00e9rieures \u00e0 3.2.18",
"product": {
"name": "Wireshark",
"vendor": {
"name": "Wireshark",
"scada": false
}
}
},
{
"description": "Wireshark versions 3.4.x ant\u00e9rieures \u00e0 3.4.10",
"product": {
"name": "Wireshark",
"vendor": {
"name": "Wireshark",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-39922",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39922"
},
{
"name": "CVE-2021-39924",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39924"
},
{
"name": "CVE-2021-39928",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39928"
},
{
"name": "CVE-2021-39926",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39926"
},
{
"name": "CVE-2021-39921",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39921"
},
{
"name": "CVE-2021-39925",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39925"
},
{
"name": "CVE-2021-39920",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39920"
},
{
"name": "CVE-2021-39929",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39929"
}
],
"initial_release_date": "2021-11-18T00:00:00",
"last_revision_date": "2021-11-18T00:00:00",
"links": [],
"reference": "CERTFR-2021-AVI-882",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-11-18T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Wireshark. Elles\npermettent \u00e0 un attaquant de provoquer un d\u00e9ni de service.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Wireshark",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2021-07 du 17 novembre 2021",
"url": "https://www.wireshark.org/security/wnpa-sec-2021-07.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2021-15 du 17 novembre 2021",
"url": "https://www.wireshark.org/security/wnpa-sec-2021-15.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2021-14 du 17 novembre 2021",
"url": "https://www.wireshark.org/security/wnpa-sec-2021-14.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2021-13 du 17 novembre 2021",
"url": "https://www.wireshark.org/security/wnpa-sec-2021-13.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2021-10 du 17 novembre 2021",
"url": "https://www.wireshark.org/security/wnpa-sec-2021-10.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2021-09 du 17 novembre 2021",
"url": "https://www.wireshark.org/security/wnpa-sec-2021-09.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2021-11 du 17 novembre 2021",
"url": "https://www.wireshark.org/security/wnpa-sec-2021-11.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2021-08 du 17 novembre 2021",
"url": "https://www.wireshark.org/security/wnpa-sec-2021-08.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2021-12 du 17 novembre 2021",
"url": "https://www.wireshark.org/security/wnpa-sec-2021-12.html"
}
]
}
CERTFR-2021-AVI-541
Vulnerability from certfr_avis
Une vulnérabilité a été découverte dans Wireshark. Elle permet à un attaquant de provoquer un déni de service.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Wireshark versions 3.4.x ant\u00e9rieures \u00e0 3.4.7",
"product": {
"name": "Wireshark",
"vendor": {
"name": "Wireshark",
"scada": false
}
}
},
{
"description": "Wireshark versions 3.2.x ant\u00e9rieures \u00e0 3.2.15",
"product": {
"name": "Wireshark",
"vendor": {
"name": "Wireshark",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-22235",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22235"
}
],
"initial_release_date": "2021-07-19T00:00:00",
"last_revision_date": "2021-07-19T00:00:00",
"links": [],
"reference": "CERTFR-2021-AVI-541",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-07-19T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans Wireshark. Elle permet \u00e0 un\nattaquant de provoquer un d\u00e9ni de service.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans Wireshark",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Wireshark wnpa-sec-2021-06 du 14 juillet 2021",
"url": "https://www.wireshark.org/security/wnpa-sec-2021-06.html"
}
]
}