Transient DOS may occur while processing malformed length field in SSID IEs.
Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability
Memory corruption occurs while connecting a STA to an AP and initiating an ADD TS request from the AP to establish a TSpec session.
Transient DOS while connecting STA to AP and initiating ADD TS request from AP to establish TSpec session.
Transient DOS while parsing per STA profile in ML IE.
Buffer over-read in Windows GDI+ allows an unauthorized attacker to deny service over a network.
A flaw was found in the freeimage library. Processing a crafted image can cause a buffer over-read of 1 byte in the read_iptc_profile function in the Source/Metadata/IPTC.cpp file because the size of the profile is not being sanitized, causing a crash in the application linked to the library, resulting in a denial of service.
A Buffer Over-read vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS). When an affected device receives a BGP update with a set of specific optional transitive attributes over an established peering session, rpd will crash and restart when attempting to advertise the received information to another peer. This issue can only happen if one or both of the BGP peers of the receiving session are non-4-byte-AS capable as determined from the advertised capabilities during BGP session establishment. Junos OS and Junos OS Evolved default behavior is 4-byte-AS capable unless this has been specifically disabled by configuring: [ protocols bgp ... disable-4byte-as ] Established BGP sessions can be checked by executing: show bgp neighbor <IP address> | match "4 byte AS" This issue affects: Junos OS: * all versions before 22.4R3-S8, * 23.2 versions before 23.2R2-S5, * 23.4 versions before 23.4R2-S6, * 24.2 versions before 24.2R2-S2, * 24.4 versions before 24.4R2; Junos OS Evolved: * all versions before 22.4R3-S8-EVO, * 23.2 versions before 23.2R2-S5-EVO, * 23.4 versions before 23.4R2-S6-EVO, * 24.2 versions before 24.2R2-S2-EVO, * 24.4 versions before 24.4R2-EVO.
Transient DOS can occur when the driver parses the per STA profile IE and tries to access the EXTN element ID without checking the IE length.
Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability
Transient DOS while parsing probe response and assoc response frame.
Windows Remote Desktop Licensing Service Denial of Service Vulnerability
DHCP Server Service Denial of Service Vulnerability
DHCP Server Service Denial of Service Vulnerability
Transient DOS in WLAN Firmware while parsing WLAN beacon or probe-response frame.
Remote Procedure Call Runtime Denial of Service Vulnerability
Transient DOS when WLAN firmware receives "reassoc response" frame including RIC_DATA element.
Transient DOS in WLAN Firmware while parsing a NAN management frame.
Transient DOS in WLAN Firmware while parsing rsn ies.
Transient DOS in WLAN Firmware while interpreting MBSSID IE of a received beacon frame.
Transient DOS while parsing a vender specific IE (Information Element) of reassociation response management frame.
Remote Procedure Call Runtime Denial of Service Vulnerability
Transient DOS while converting TWT (Target Wake Time) frame parameters in the OTA broadcast.
Remote Procedure Call Runtime Denial of Service Vulnerability
Transient DOS in Data Modem during DTLS handshake.
Transient DOS while parsing ieee80211_parse_mscs_ie in WIN WLAN driver.
Transient DOS in WLAN Firmware while parsing a BTM request.
Transient DOS while parsing WPA IES, when it is passed with length more than expected size.
Transient DOS in WLAN Firmware while parsing t2lm buffers.
Remote Procedure Call Runtime Denial of Service Vulnerability
Transient DOS in Audio while remapping channel buffer in media codec decoding.
Transient DOS while parsing the multi-link element Control field when common information length check is missing before updating the location.
Transient DOS may occur while parsing SSID in action frames.
On affected platforms running Arista CloudEOS an issue in the Software Forwarding Engine (Sfe) can lead to a potential denial of service attack by sending malformed packets to the switch. This causes a leak of packet buffers and if enough malformed packets are received, the switch may eventually stop forwarding traffic.
An access violation vulnerability exists in the eventcore functionality of Milesight UR32L v32.3.0.5. A specially crafted network request can lead to denial of service. An attacker can send a network request to trigger this vulnerability.
Transient DOS while parsing the received TID-to-link mapping action frame.
Transient DOS in WLAN Firmware while processing the received beacon or probe response frame.
Windows Secure Channel Denial of Service Vulnerability
Microsoft Protected Extensible Authentication Protocol (PEAP) Denial of Service Vulnerability
Transient DOS in WLAN Firmware while processing frames with missing header fields.
Windows iSCSI Service Denial of Service Vulnerability
Transient DOS while parsing WLAN beacon or probe-response frame.
Transient DOS in WLAN Firmware while parsing FT Information Elements.
Transient DOS while processing TID-to-link mapping IE elements.
Transient DOS while parsing the received TID-to-link mapping element of the TID-to-link mapping action frame.
Transient DOS while processing of a registration acceptance OTA due to incorrect ciphering key data IE.
Transient DOS while parsing the received TID-to-link mapping element of beacon/probe response frame.
Transient DOS while parsing MBSSID during new IE generation in beacon/probe frame when IE length check is either missing or improper.
Transient DOS while parsing SCAN RNR IE when bytes received from AP is such that the size of the last param of IE is less than neighbor report.
Transient DOS while parsing ESP IE from beacon/probe response frame.