<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">wireshark-2.2.2-1.1 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:10199-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-15T00:00:00Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-15T00:00:00Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-15T00:00:00Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">wireshark-2.2.2-1.1 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the wireshark-2.2.2-1.1 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-10199</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2009-1210/</URL>
      <Description>SUSE CVE CVE-2009-1210 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2009-1267/</URL>
      <Description>SUSE CVE CVE-2009-1267 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2009-1268/</URL>
      <Description>SUSE CVE CVE-2009-1268 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2009-1269/</URL>
      <Description>SUSE CVE CVE-2009-1269 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2009-3241/</URL>
      <Description>SUSE CVE CVE-2009-3241 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2009-3242/</URL>
      <Description>SUSE CVE CVE-2009-3242 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2009-3243/</URL>
      <Description>SUSE CVE CVE-2009-3243 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2010-1455/</URL>
      <Description>SUSE CVE CVE-2010-1455 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2010-2993/</URL>
      <Description>SUSE CVE CVE-2010-2993 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2010-3445/</URL>
      <Description>SUSE CVE CVE-2010-3445 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2010-4300/</URL>
      <Description>SUSE CVE CVE-2010-4300 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2010-4301/</URL>
      <Description>SUSE CVE CVE-2010-4301 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2010-4538/</URL>
      <Description>SUSE CVE CVE-2010-4538 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2011-0024/</URL>
      <Description>SUSE CVE CVE-2011-0024 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2011-0538/</URL>
      <Description>SUSE CVE CVE-2011-0538 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2011-0713/</URL>
      <Description>SUSE CVE CVE-2011-0713 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2011-1138/</URL>
      <Description>SUSE CVE CVE-2011-1138 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2011-1139/</URL>
      <Description>SUSE CVE CVE-2011-1139 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2011-1140/</URL>
      <Description>SUSE CVE CVE-2011-1140 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2011-1143/</URL>
      <Description>SUSE CVE CVE-2011-1143 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2011-1590/</URL>
      <Description>SUSE CVE CVE-2011-1590 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2011-1591/</URL>
      <Description>SUSE CVE CVE-2011-1591 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2011-1592/</URL>
      <Description>SUSE CVE CVE-2011-1592 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2011-1957/</URL>
      <Description>SUSE CVE CVE-2011-1957 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2011-1958/</URL>
      <Description>SUSE CVE CVE-2011-1958 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2011-1959/</URL>
      <Description>SUSE CVE CVE-2011-1959 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2011-2174/</URL>
      <Description>SUSE CVE CVE-2011-2174 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2011-2175/</URL>
      <Description>SUSE CVE CVE-2011-2175 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2011-2597/</URL>
      <Description>SUSE CVE CVE-2011-2597 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2011-2698/</URL>
      <Description>SUSE CVE CVE-2011-2698 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2011-3266/</URL>
      <Description>SUSE CVE CVE-2011-3266 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2011-3360/</URL>
      <Description>SUSE CVE CVE-2011-3360 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2011-3483/</URL>
      <Description>SUSE CVE CVE-2011-3483 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-2392/</URL>
      <Description>SUSE CVE CVE-2012-2392 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-2393/</URL>
      <Description>SUSE CVE CVE-2012-2393 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-2394/</URL>
      <Description>SUSE CVE CVE-2012-2394 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-3548/</URL>
      <Description>SUSE CVE CVE-2012-3548 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-4048/</URL>
      <Description>SUSE CVE CVE-2012-4048 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-4049/</URL>
      <Description>SUSE CVE CVE-2012-4049 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-4285/</URL>
      <Description>SUSE CVE CVE-2012-4285 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-4286/</URL>
      <Description>SUSE CVE CVE-2012-4286 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-4287/</URL>
      <Description>SUSE CVE CVE-2012-4287 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-4288/</URL>
      <Description>SUSE CVE CVE-2012-4288 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-4289/</URL>
      <Description>SUSE CVE CVE-2012-4289 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-4290/</URL>
      <Description>SUSE CVE CVE-2012-4290 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-4291/</URL>
      <Description>SUSE CVE CVE-2012-4291 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-4292/</URL>
      <Description>SUSE CVE CVE-2012-4292 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-4293/</URL>
      <Description>SUSE CVE CVE-2012-4293 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-4294/</URL>
      <Description>SUSE CVE CVE-2012-4294 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-4295/</URL>
      <Description>SUSE CVE CVE-2012-4295 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-4296/</URL>
      <Description>SUSE CVE CVE-2012-4296 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-4297/</URL>
      <Description>SUSE CVE CVE-2012-4297 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-4298/</URL>
      <Description>SUSE CVE CVE-2012-4298 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-5237/</URL>
      <Description>SUSE CVE CVE-2012-5237 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-5238/</URL>
      <Description>SUSE CVE CVE-2012-5238 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-5239/</URL>
      <Description>SUSE CVE CVE-2012-5239 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-5240/</URL>
      <Description>SUSE CVE CVE-2012-5240 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-5592/</URL>
      <Description>SUSE CVE CVE-2012-5592 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-5593/</URL>
      <Description>SUSE CVE CVE-2012-5593 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-5594/</URL>
      <Description>SUSE CVE CVE-2012-5594 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-5595/</URL>
      <Description>SUSE CVE CVE-2012-5595 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-5596/</URL>
      <Description>SUSE CVE CVE-2012-5596 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-5597/</URL>
      <Description>SUSE CVE CVE-2012-5597 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-5598/</URL>
      <Description>SUSE CVE CVE-2012-5598 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-5599/</URL>
      <Description>SUSE CVE CVE-2012-5599 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-5600/</URL>
      <Description>SUSE CVE CVE-2012-5600 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-5601/</URL>
      <Description>SUSE CVE CVE-2012-5601 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2012-5602/</URL>
      <Description>SUSE CVE CVE-2012-5602 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-1572/</URL>
      <Description>SUSE CVE CVE-2013-1572 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-1573/</URL>
      <Description>SUSE CVE CVE-2013-1573 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-1574/</URL>
      <Description>SUSE CVE CVE-2013-1574 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-1575/</URL>
      <Description>SUSE CVE CVE-2013-1575 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-1576/</URL>
      <Description>SUSE CVE CVE-2013-1576 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-1577/</URL>
      <Description>SUSE CVE CVE-2013-1577 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-1578/</URL>
      <Description>SUSE CVE CVE-2013-1578 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-1579/</URL>
      <Description>SUSE CVE CVE-2013-1579 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-1580/</URL>
      <Description>SUSE CVE CVE-2013-1580 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-1581/</URL>
      <Description>SUSE CVE CVE-2013-1581 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-1582/</URL>
      <Description>SUSE CVE CVE-2013-1582 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-1583/</URL>
      <Description>SUSE CVE CVE-2013-1583 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-1584/</URL>
      <Description>SUSE CVE CVE-2013-1584 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-1585/</URL>
      <Description>SUSE CVE CVE-2013-1585 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-1586/</URL>
      <Description>SUSE CVE CVE-2013-1586 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-1587/</URL>
      <Description>SUSE CVE CVE-2013-1587 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-1588/</URL>
      <Description>SUSE CVE CVE-2013-1588 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-1589/</URL>
      <Description>SUSE CVE CVE-2013-1589 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-1590/</URL>
      <Description>SUSE CVE CVE-2013-1590 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-2475/</URL>
      <Description>SUSE CVE CVE-2013-2475 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-2476/</URL>
      <Description>SUSE CVE CVE-2013-2476 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-2477/</URL>
      <Description>SUSE CVE CVE-2013-2477 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-2478/</URL>
      <Description>SUSE CVE CVE-2013-2478 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-2479/</URL>
      <Description>SUSE CVE CVE-2013-2479 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-2480/</URL>
      <Description>SUSE CVE CVE-2013-2480 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-2481/</URL>
      <Description>SUSE CVE CVE-2013-2481 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-2482/</URL>
      <Description>SUSE CVE CVE-2013-2482 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-2483/</URL>
      <Description>SUSE CVE CVE-2013-2483 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-2484/</URL>
      <Description>SUSE CVE CVE-2013-2484 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-2485/</URL>
      <Description>SUSE CVE CVE-2013-2485 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-2486/</URL>
      <Description>SUSE CVE CVE-2013-2486 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-2487/</URL>
      <Description>SUSE CVE CVE-2013-2487 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-2488/</URL>
      <Description>SUSE CVE CVE-2013-2488 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-3555/</URL>
      <Description>SUSE CVE CVE-2013-3555 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-3556/</URL>
      <Description>SUSE CVE CVE-2013-3556 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-3557/</URL>
      <Description>SUSE CVE CVE-2013-3557 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-3558/</URL>
      <Description>SUSE CVE CVE-2013-3558 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-3559/</URL>
      <Description>SUSE CVE CVE-2013-3559 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-3560/</URL>
      <Description>SUSE CVE CVE-2013-3560 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-3561/</URL>
      <Description>SUSE CVE CVE-2013-3561 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-3562/</URL>
      <Description>SUSE CVE CVE-2013-3562 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-4083/</URL>
      <Description>SUSE CVE CVE-2013-4083 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-4920/</URL>
      <Description>SUSE CVE CVE-2013-4920 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-4921/</URL>
      <Description>SUSE CVE CVE-2013-4921 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-4922/</URL>
      <Description>SUSE CVE CVE-2013-4922 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-4923/</URL>
      <Description>SUSE CVE CVE-2013-4923 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-4924/</URL>
      <Description>SUSE CVE CVE-2013-4924 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-4925/</URL>
      <Description>SUSE CVE CVE-2013-4925 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-4926/</URL>
      <Description>SUSE CVE CVE-2013-4926 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-4927/</URL>
      <Description>SUSE CVE CVE-2013-4927 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-4928/</URL>
      <Description>SUSE CVE CVE-2013-4928 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-4929/</URL>
      <Description>SUSE CVE CVE-2013-4929 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-4930/</URL>
      <Description>SUSE CVE CVE-2013-4930 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-4931/</URL>
      <Description>SUSE CVE CVE-2013-4931 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-4932/</URL>
      <Description>SUSE CVE CVE-2013-4932 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-4933/</URL>
      <Description>SUSE CVE CVE-2013-4933 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-4934/</URL>
      <Description>SUSE CVE CVE-2013-4934 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-4935/</URL>
      <Description>SUSE CVE CVE-2013-4935 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-4936/</URL>
      <Description>SUSE CVE CVE-2013-4936 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-5717/</URL>
      <Description>SUSE CVE CVE-2013-5717 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-5718/</URL>
      <Description>SUSE CVE CVE-2013-5718 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-5719/</URL>
      <Description>SUSE CVE CVE-2013-5719 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-5720/</URL>
      <Description>SUSE CVE CVE-2013-5720 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-5721/</URL>
      <Description>SUSE CVE CVE-2013-5721 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-5722/</URL>
      <Description>SUSE CVE CVE-2013-5722 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-6336/</URL>
      <Description>SUSE CVE CVE-2013-6336 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-6337/</URL>
      <Description>SUSE CVE CVE-2013-6337 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-6338/</URL>
      <Description>SUSE CVE CVE-2013-6338 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-6339/</URL>
      <Description>SUSE CVE CVE-2013-6339 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-6340/</URL>
      <Description>SUSE CVE CVE-2013-6340 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-7112/</URL>
      <Description>SUSE CVE CVE-2013-7112 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-7113/</URL>
      <Description>SUSE CVE CVE-2013-7113 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-7114/</URL>
      <Description>SUSE CVE CVE-2013-7114 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-2281/</URL>
      <Description>SUSE CVE CVE-2014-2281 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-2282/</URL>
      <Description>SUSE CVE CVE-2014-2282 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-2283/</URL>
      <Description>SUSE CVE CVE-2014-2283 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-2299/</URL>
      <Description>SUSE CVE CVE-2014-2299 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-2907/</URL>
      <Description>SUSE CVE CVE-2014-2907 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-4020/</URL>
      <Description>SUSE CVE CVE-2014-4020 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-5161/</URL>
      <Description>SUSE CVE CVE-2014-5161 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-5162/</URL>
      <Description>SUSE CVE CVE-2014-5162 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-5163/</URL>
      <Description>SUSE CVE CVE-2014-5163 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-5164/</URL>
      <Description>SUSE CVE CVE-2014-5164 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-5165/</URL>
      <Description>SUSE CVE CVE-2014-5165 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-6423/</URL>
      <Description>SUSE CVE CVE-2014-6423 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-6424/</URL>
      <Description>SUSE CVE CVE-2014-6424 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-6425/</URL>
      <Description>SUSE CVE CVE-2014-6425 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-6426/</URL>
      <Description>SUSE CVE CVE-2014-6426 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-6427/</URL>
      <Description>SUSE CVE CVE-2014-6427 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-6428/</URL>
      <Description>SUSE CVE CVE-2014-6428 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-6429/</URL>
      <Description>SUSE CVE CVE-2014-6429 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-6430/</URL>
      <Description>SUSE CVE CVE-2014-6430 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-6431/</URL>
      <Description>SUSE CVE CVE-2014-6431 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-6432/</URL>
      <Description>SUSE CVE CVE-2014-6432 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-8710/</URL>
      <Description>SUSE CVE CVE-2014-8710 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-8711/</URL>
      <Description>SUSE CVE CVE-2014-8711 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-8712/</URL>
      <Description>SUSE CVE CVE-2014-8712 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-8713/</URL>
      <Description>SUSE CVE CVE-2014-8713 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-8714/</URL>
      <Description>SUSE CVE CVE-2014-8714 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-0559/</URL>
      <Description>SUSE CVE CVE-2015-0559 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-0560/</URL>
      <Description>SUSE CVE CVE-2015-0560 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-0561/</URL>
      <Description>SUSE CVE CVE-2015-0561 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-0562/</URL>
      <Description>SUSE CVE CVE-2015-0562 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-0563/</URL>
      <Description>SUSE CVE CVE-2015-0563 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-0564/</URL>
      <Description>SUSE CVE CVE-2015-0564 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-2187/</URL>
      <Description>SUSE CVE CVE-2015-2187 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-2188/</URL>
      <Description>SUSE CVE CVE-2015-2188 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-2189/</URL>
      <Description>SUSE CVE CVE-2015-2189 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-2190/</URL>
      <Description>SUSE CVE CVE-2015-2190 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-2191/</URL>
      <Description>SUSE CVE CVE-2015-2191 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-2192/</URL>
      <Description>SUSE CVE CVE-2015-2192 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-3808/</URL>
      <Description>SUSE CVE CVE-2015-3808 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-3809/</URL>
      <Description>SUSE CVE CVE-2015-3809 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-3810/</URL>
      <Description>SUSE CVE CVE-2015-3810 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-3811/</URL>
      <Description>SUSE CVE CVE-2015-3811 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-3812/</URL>
      <Description>SUSE CVE CVE-2015-3812 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-3813/</URL>
      <Description>SUSE CVE CVE-2015-3813 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-3814/</URL>
      <Description>SUSE CVE CVE-2015-3814 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-3815/</URL>
      <Description>SUSE CVE CVE-2015-3815 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-4651/</URL>
      <Description>SUSE CVE CVE-2015-4651 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-4652/</URL>
      <Description>SUSE CVE CVE-2015-4652 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-6241/</URL>
      <Description>SUSE CVE CVE-2015-6241 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-6242/</URL>
      <Description>SUSE CVE CVE-2015-6242 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-6243/</URL>
      <Description>SUSE CVE CVE-2015-6243 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-6244/</URL>
      <Description>SUSE CVE CVE-2015-6244 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-6245/</URL>
      <Description>SUSE CVE CVE-2015-6245 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-6246/</URL>
      <Description>SUSE CVE CVE-2015-6246 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-6247/</URL>
      <Description>SUSE CVE CVE-2015-6247 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-6248/</URL>
      <Description>SUSE CVE CVE-2015-6248 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-6249/</URL>
      <Description>SUSE CVE CVE-2015-6249 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-7830/</URL>
      <Description>SUSE CVE CVE-2015-7830 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-8711/</URL>
      <Description>SUSE CVE CVE-2015-8711 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-8718/</URL>
      <Description>SUSE CVE CVE-2015-8718 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-8720/</URL>
      <Description>SUSE CVE CVE-2015-8720 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-8721/</URL>
      <Description>SUSE CVE CVE-2015-8721 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-8722/</URL>
      <Description>SUSE CVE CVE-2015-8722 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-8723/</URL>
      <Description>SUSE CVE CVE-2015-8723 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-8724/</URL>
      <Description>SUSE CVE CVE-2015-8724 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-8725/</URL>
      <Description>SUSE CVE CVE-2015-8725 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-8726/</URL>
      <Description>SUSE CVE CVE-2015-8726 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-8727/</URL>
      <Description>SUSE CVE CVE-2015-8727 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-8728/</URL>
      <Description>SUSE CVE CVE-2015-8728 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-8729/</URL>
      <Description>SUSE CVE CVE-2015-8729 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-8730/</URL>
      <Description>SUSE CVE CVE-2015-8730 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-8731/</URL>
      <Description>SUSE CVE CVE-2015-8731 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-8732/</URL>
      <Description>SUSE CVE CVE-2015-8732 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-8733/</URL>
      <Description>SUSE CVE CVE-2015-8733 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-8734/</URL>
      <Description>SUSE CVE CVE-2015-8734 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-8735/</URL>
      <Description>SUSE CVE CVE-2015-8735 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-8736/</URL>
      <Description>SUSE CVE CVE-2015-8736 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-8737/</URL>
      <Description>SUSE CVE CVE-2015-8737 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-8738/</URL>
      <Description>SUSE CVE CVE-2015-8738 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-8739/</URL>
      <Description>SUSE CVE CVE-2015-8739 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-8740/</URL>
      <Description>SUSE CVE CVE-2015-8740 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-8741/</URL>
      <Description>SUSE CVE CVE-2015-8741 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-8742/</URL>
      <Description>SUSE CVE CVE-2015-8742 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-2522/</URL>
      <Description>SUSE CVE CVE-2016-2522 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-2523/</URL>
      <Description>SUSE CVE CVE-2016-2523 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-2524/</URL>
      <Description>SUSE CVE CVE-2016-2524 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-2525/</URL>
      <Description>SUSE CVE CVE-2016-2525 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-2526/</URL>
      <Description>SUSE CVE CVE-2016-2526 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-2527/</URL>
      <Description>SUSE CVE CVE-2016-2527 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-2528/</URL>
      <Description>SUSE CVE CVE-2016-2528 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-2529/</URL>
      <Description>SUSE CVE CVE-2016-2529 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-2530/</URL>
      <Description>SUSE CVE CVE-2016-2530 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-2531/</URL>
      <Description>SUSE CVE CVE-2016-2531 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-2532/</URL>
      <Description>SUSE CVE CVE-2016-2532 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-5350/</URL>
      <Description>SUSE CVE CVE-2016-5350 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-5351/</URL>
      <Description>SUSE CVE CVE-2016-5351 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-5352/</URL>
      <Description>SUSE CVE CVE-2016-5352 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-5353/</URL>
      <Description>SUSE CVE CVE-2016-5353 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-5354/</URL>
      <Description>SUSE CVE CVE-2016-5354 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-5355/</URL>
      <Description>SUSE CVE CVE-2016-5355 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-5356/</URL>
      <Description>SUSE CVE CVE-2016-5356 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-5357/</URL>
      <Description>SUSE CVE CVE-2016-5357 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-5358/</URL>
      <Description>SUSE CVE CVE-2016-5358 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-6505/</URL>
      <Description>SUSE CVE CVE-2016-6505 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-6508/</URL>
      <Description>SUSE CVE CVE-2016-6508 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-6509/</URL>
      <Description>SUSE CVE CVE-2016-6509 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-6510/</URL>
      <Description>SUSE CVE CVE-2016-6510 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-6511/</URL>
      <Description>SUSE CVE CVE-2016-6511 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-6512/</URL>
      <Description>SUSE CVE CVE-2016-6512 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-6513/</URL>
      <Description>SUSE CVE CVE-2016-6513 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-7175/</URL>
      <Description>SUSE CVE CVE-2016-7175 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-7176/</URL>
      <Description>SUSE CVE CVE-2016-7176 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-7177/</URL>
      <Description>SUSE CVE CVE-2016-7177 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-7178/</URL>
      <Description>SUSE CVE CVE-2016-7178 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-7179/</URL>
      <Description>SUSE CVE CVE-2016-7179 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-7180/</URL>
      <Description>SUSE CVE CVE-2016-7180 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-9372/</URL>
      <Description>SUSE CVE CVE-2016-9372 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-9373/</URL>
      <Description>SUSE CVE CVE-2016-9373 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-9374/</URL>
      <Description>SUSE CVE CVE-2016-9374 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-9375/</URL>
      <Description>SUSE CVE CVE-2016-9375 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-9376/</URL>
      <Description>SUSE CVE CVE-2016-9376 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="wireshark-2.2.2-1.1">
      <FullProductName ProductID="wireshark-2.2.2-1.1">wireshark-2.2.2-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="wireshark-devel-2.2.2-1.1">
      <FullProductName ProductID="wireshark-devel-2.2.2-1.1">wireshark-devel-2.2.2-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="wireshark-ui-gtk-2.2.2-1.1">
      <FullProductName ProductID="wireshark-ui-gtk-2.2.2-1.1">wireshark-ui-gtk-2.2.2-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="wireshark-ui-qt-2.2.2-1.1">
      <FullProductName ProductID="wireshark-ui-qt-2.2.2-1.1">wireshark-ui-qt-2.2.2-1.1</FullProductName>
    </Branch>
    <Relationship ProductReference="wireshark-2.2.2-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:wireshark-2.2.2-1.1">wireshark-2.2.2-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="wireshark-devel-2.2.2-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1">wireshark-devel-2.2.2-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="wireshark-ui-gtk-2.2.2-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1">wireshark-ui-gtk-2.2.2-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="wireshark-ui-qt-2.2.2-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1">wireshark-ui-qt-2.2.2-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Format string vulnerability in the PROFINET/DCP (PN-DCP) dissector in Wireshark 1.0.6 and earlier allows remote attackers to execute arbitrary code via a PN-DCP packet with format string specifiers in the station name.  NOTE: some of these details are obtained from third party information.</Note>
    </Notes>
    <CVE>CVE-2009-1210</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>10</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2009-1210.html</URL>
        <Description>CVE-2009-1210</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/491449</URL>
        <Description>SUSE Bug 491449</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/493584</URL>
        <Description>SUSE Bug 493584</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in the LDAP dissector in Wireshark 0.99.2 through 1.0.6, when running on Windows, allows remote attackers to cause a denial of service (crash) via unknown attack vectors.</Note>
    </Notes>
    <CVE>CVE-2009-1267</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2009-1267.html</URL>
        <Description>CVE-2009-1267</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/493584</URL>
        <Description>SUSE Bug 493584</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The Check Point High-Availability Protocol (CPHAP) dissector in Wireshark 0.9.6 through 1.0.6 allows remote attackers to cause a denial of service (crash) via a crafted FWHA_MY_STATE packet.</Note>
    </Notes>
    <CVE>CVE-2009-1268</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2009-1268.html</URL>
        <Description>CVE-2009-1268</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/493584</URL>
        <Description>SUSE Bug 493584</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in Wireshark 0.99.6 through 1.0.6 allows remote attackers to cause a denial of service (crash) via a crafted Tektronix .rf5 file.</Note>
    </Notes>
    <CVE>CVE-2009-1269</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2009-1269.html</URL>
        <Description>CVE-2009-1269</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/493584</URL>
        <Description>SUSE Bug 493584</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in the OpcUa (OPC UA) dissector in Wireshark 0.99.6 through 1.0.8 and 1.2.0 through 1.2.1 allows remote attackers to cause a denial of service (memory and CPU consumption) via malformed OPCUA Service CallRequest packets.</Note>
    </Notes>
    <CVE>CVE-2009-3241</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.8</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2009-3241.html</URL>
        <Description>CVE-2009-3241</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/541654</URL>
        <Description>SUSE Bug 541654</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in packet.c in the GSM A RR dissector in Wireshark 1.2.0 and 1.2.1 allows remote attackers to cause a denial of service (application crash) via unknown vectors related to "an uninitialized dissector handle," which triggers an assertion failure.</Note>
    </Notes>
    <CVE>CVE-2009-3242</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2009-3242.html</URL>
        <Description>CVE-2009-3242</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/541659</URL>
        <Description>SUSE Bug 541659</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in the TLS dissector in Wireshark 1.2.0 and 1.2.1, when running on Windows, allows remote attackers to cause a denial of service (application crash) via unknown vectors related to TLS 1.2 conversations.</Note>
    </Notes>
    <CVE>CVE-2009-3243</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2009-3243.html</URL>
        <Description>CVE-2009-3243</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/541655</URL>
        <Description>SUSE Bug 541655</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The DOCSIS dissector in Wireshark 0.9.6 through 1.0.12 and 1.2.0 through 1.2.7 allows user-assisted remote attackers to cause a denial of service (application crash) via a malformed packet trace file.</Note>
    </Notes>
    <CVE>CVE-2010-1455</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2010-1455.html</URL>
        <Description>CVE-2010-1455</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/603251</URL>
        <Description>SUSE Bug 603251</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The IPMI dissector in Wireshark 1.2.0 through 1.2.9 allows remote attackers to cause a denial of service (infinite loop) via unknown vectors.</Note>
    </Notes>
    <CVE>CVE-2010-2993</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2010-2993.html</URL>
        <Description>CVE-2010-2993</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/630599</URL>
        <Description>SUSE Bug 630599</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Stack consumption vulnerability in the dissect_ber_unknown function in epan/dissectors/packet-ber.c in the BER dissector in Wireshark 1.4.x before 1.4.1 and 1.2.x before 1.2.12 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a long string in an unknown ASN.1/BER encoded packet, as demonstrated using SNMP.</Note>
    </Notes>
    <CVE>CVE-2010-3445</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2010-3445.html</URL>
        <Description>CVE-2010-3445</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/643078</URL>
        <Description>SUSE Bug 643078</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap-based buffer overflow in the dissect_ldss_transfer function (epan/dissectors/packet-ldss.c) in the LDSS dissector in Wireshark 1.2.0 through 1.2.12 and 1.4.0 through 1.4.1 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via an LDSS packet with a long digest line that triggers memory corruption.</Note>
    </Notes>
    <CVE>CVE-2010-4300</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2010-4300.html</URL>
        <Description>CVE-2010-4300</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/655448</URL>
        <Description>SUSE Bug 655448</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">epan/dissectors/packet-zbee-zcl.c in the ZigBee ZCL dissector in Wireshark 1.4.0 through 1.4.1 allows remote attackers to cause a denial of service (infinite loop) via a crafted ZCL packet, related to Discover Attributes.</Note>
    </Notes>
    <CVE>CVE-2010-4301</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2010-4301.html</URL>
        <Description>CVE-2010-4301</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/655448</URL>
        <Description>SUSE Bug 655448</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Buffer overflow in the sect_enttec_dmx_da function in epan/dissectors/packet-enttec.c in Wireshark 1.4.2 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted ENTTEC DMX packet with Run Length Encoding (RLE) compression.</Note>
    </Notes>
    <CVE>CVE-2010-4538</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>9.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2010-4538.html</URL>
        <Description>CVE-2010-4538</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/662029</URL>
        <Description>SUSE Bug 662029</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap-based buffer overflow in wiretap/pcapng.c in Wireshark before 1.2 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted capture file.</Note>
    </Notes>
    <CVE>CVE-2011-0024</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>9.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2011-0024.html</URL>
        <Description>CVE-2011-0024</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/683335</URL>
        <Description>SUSE Bug 683335</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Wireshark 1.2.0 through 1.2.14, 1.4.0 through 1.4.3, and 1.5.0 frees an uninitialized pointer during processing of a .pcap file in the pcap-ng format, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a malformed file.</Note>
    </Notes>
    <CVE>CVE-2011-0538</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2011-0538.html</URL>
        <Description>CVE-2011-0538</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/669908</URL>
        <Description>SUSE Bug 669908</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap-based buffer overflow in wiretap/dct3trace.c in Wireshark 1.2.0 through 1.2.14 and 1.4.0 through 1.4.3 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a long record in a Nokia DCT3 trace file.</Note>
    </Notes>
    <CVE>CVE-2011-0713</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2011-0713.html</URL>
        <Description>CVE-2011-0713</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/672916</URL>
        <Description>SUSE Bug 672916</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Off-by-one error in the dissect_6lowpan_iphc function in packet-6lowpan.c in Wireshark 1.4.0 through 1.4.3 on 32-bit platforms allows remote attackers to cause a denial of service (application crash) via a malformed 6LoWPAN IPv6 packet.</Note>
    </Notes>
    <CVE>CVE-2011-1138</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2011-1138.html</URL>
        <Description>CVE-2011-1138</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/678567</URL>
        <Description>SUSE Bug 678567</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="18">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">wiretap/pcapng.c in Wireshark 1.2.0 through 1.2.14 and 1.4.0 through 1.4.3 allows remote attackers to cause a denial of service (application crash) via a pcap-ng file that contains a large packet-length field.</Note>
    </Notes>
    <CVE>CVE-2011-1139</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2011-1139.html</URL>
        <Description>CVE-2011-1139</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/678568</URL>
        <Description>SUSE Bug 678568</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="19">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple stack consumption vulnerabilities in the dissect_ms_compressed_string and dissect_mscldap_string functions in Wireshark 1.0.x, 1.2.0 through 1.2.14, and 1.4.0 through 1.4.3 allow remote attackers to cause a denial of service (infinite recursion) via a crafted (1) SMB or (2) Connection-less LDAP (CLDAP) packet.</Note>
    </Notes>
    <CVE>CVE-2011-1140</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2011-1140.html</URL>
        <Description>CVE-2011-1140</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/678569</URL>
        <Description>SUSE Bug 678569</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="20">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">epan/dissectors/packet-ntlmssp.c in the NTLMSSP dissector in Wireshark before 1.4.4 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted .pcap file.</Note>
    </Notes>
    <CVE>CVE-2011-1143</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2011-1143.html</URL>
        <Description>CVE-2011-1143</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/678571</URL>
        <Description>SUSE Bug 678571</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="21">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The X.509if dissector in Wireshark 1.2.x before 1.2.16 and 1.4.x before 1.4.5 does not properly initialize certain global variables, which allows remote attackers to cause a denial of service (application crash) via a crafted .pcap file.</Note>
    </Notes>
    <CVE>CVE-2011-1590</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2011-1590.html</URL>
        <Description>CVE-2011-1590</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/688109</URL>
        <Description>SUSE Bug 688109</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="22">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Stack-based buffer overflow in the DECT dissector in epan/dissectors/packet-dect.c in Wireshark 1.4.x before 1.4.5 allows remote attackers to execute arbitrary code via a crafted .pcap file.</Note>
    </Notes>
    <CVE>CVE-2011-1591</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>9.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2011-1591.html</URL>
        <Description>CVE-2011-1591</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/688109</URL>
        <Description>SUSE Bug 688109</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="23">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The NFS dissector in epan/dissectors/packet-nfs.c in Wireshark 1.4.x before 1.4.5 on Windows uses an incorrect integer data type during decoding of SETCLIENTID calls, which allows remote attackers to cause a denial of service (application crash) via a crafted .pcap file.</Note>
    </Notes>
    <CVE>CVE-2011-1592</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2011-1592.html</URL>
        <Description>CVE-2011-1592</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/688109</URL>
        <Description>SUSE Bug 688109</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="24">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The dissect_dcm_main function in epan/dissectors/packet-dcm.c in the DICOM dissector in Wireshark 1.2.x before 1.2.17 and 1.4.x before 1.4.7 allows remote attackers to cause a denial of service (infinite loop) via an invalid PDU length.</Note>
    </Notes>
    <CVE>CVE-2011-1957</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2011-1957.html</URL>
        <Description>CVE-2011-1957</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/697516</URL>
        <Description>SUSE Bug 697516</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="25">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Wireshark 1.2.x before 1.2.17 and 1.4.x before 1.4.7 allows user-assisted remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted Diameter dictionary file.</Note>
    </Notes>
    <CVE>CVE-2011-1958</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2011-1958.html</URL>
        <Description>CVE-2011-1958</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/697516</URL>
        <Description>SUSE Bug 697516</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="26">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The snoop_read function in wiretap/snoop.c in Wireshark 1.2.x before 1.2.17 and 1.4.x before 1.4.7 does not properly handle certain virtualizable buffers, which allows remote attackers to cause a denial of service (application crash) via a large length value in a snoop file that triggers a stack-based buffer over-read.</Note>
    </Notes>
    <CVE>CVE-2011-1959</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2011-1959.html</URL>
        <Description>CVE-2011-1959</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/697516</URL>
        <Description>SUSE Bug 697516</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="27">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Double free vulnerability in the tvb_uncompress function in epan/tvbuff.c in Wireshark 1.2.x before 1.2.17 and 1.4.x before 1.4.7 allows remote attackers to cause a denial of service (application crash) via a packet with malformed data that uses zlib compression.</Note>
    </Notes>
    <CVE>CVE-2011-2174</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2011-2174.html</URL>
        <Description>CVE-2011-2174</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/697516</URL>
        <Description>SUSE Bug 697516</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="28">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Integer underflow in the visual_read function in wiretap/visual.c in Wireshark 1.2.x before 1.2.17 and 1.4.x before 1.4.7 allows remote attackers to cause a denial of service (application crash) via a malformed Visual Networks file that triggers a heap-based buffer over-read.</Note>
    </Notes>
    <CVE>CVE-2011-2175</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2011-2175.html</URL>
        <Description>CVE-2011-2175</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/697516</URL>
        <Description>SUSE Bug 697516</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="29">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The Lucent/Ascend file parser in Wireshark 1.2.x before 1.2.18, 1.4.x through 1.4.7, and 1.6.0 allows remote attackers to cause a denial of service (infinite loop) via malformed packets.</Note>
    </Notes>
    <CVE>CVE-2011-2597</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2011-2597.html</URL>
        <Description>CVE-2011-2597</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/706728</URL>
        <Description>SUSE Bug 706728</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="30">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Off-by-one error in the elem_cell_id_aux function in epan/dissectors/packet-ansi_a.c in the ANSI MAP dissector in Wireshark 1.4.x before 1.4.8 and 1.6.x before 1.6.1 allows remote attackers to cause a denial of service (infinite loop) via an invalid packet.</Note>
    </Notes>
    <CVE>CVE-2011-2698</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2011-2698.html</URL>
        <Description>CVE-2011-2698</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/706728</URL>
        <Description>SUSE Bug 706728</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="31">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The proto_tree_add_item function in Wireshark 1.6.0 through 1.6.1 and 1.4.0 through 1.4.8, when the IKEv1 protocol dissector is used, allows user-assisted remote attackers to cause a denial of service (infinite loop) via vectors involving a malformed IKE packet and many items in a tree.</Note>
    </Notes>
    <CVE>CVE-2011-3266</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.6</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2011-3266.html</URL>
        <Description>CVE-2011-3266</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/718032</URL>
        <Description>SUSE Bug 718032</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="32">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Untrusted search path vulnerability in Wireshark 1.4.x before 1.4.9 and 1.6.x before 1.6.2 allows local users to gain privileges via a Trojan horse Lua script in an unspecified directory.</Note>
    </Notes>
    <CVE>CVE-2011-3360</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>9.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2011-3360.html</URL>
        <Description>CVE-2011-3360</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/718032</URL>
        <Description>SUSE Bug 718032</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="33">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Wireshark 1.6.x before 1.6.2 allows remote attackers to cause a denial of service (application crash) via a malformed capture file that leads to an invalid root tvbuff, related to a "buffer exception handling vulnerability."</Note>
    </Notes>
    <CVE>CVE-2011-3483</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2011-3483.html</URL>
        <Description>CVE-2011-3483</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/718032</URL>
        <Description>SUSE Bug 718032</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="34">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Wireshark 1.4.x before 1.4.13 and 1.6.x before 1.6.8 allows remote attackers to cause a denial of service (infinite loop) via vectors related to the (1) ANSI MAP, (2) ASF, (3) IEEE 802.11, (4) IEEE 802.3, and (5) LTP dissectors.</Note>
    </Notes>
    <CVE>CVE-2012-2392</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.3</BaseScore>
        <Vector>AV:A/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-2392.html</URL>
        <Description>CVE-2012-2392</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/763634</URL>
        <Description>SUSE Bug 763634</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/763855</URL>
        <Description>SUSE Bug 763855</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/769578</URL>
        <Description>SUSE Bug 769578</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="35">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">epan/dissectors/packet-diameter.c in the DIAMETER dissector in Wireshark 1.4.x before 1.4.13 and 1.6.x before 1.6.8 does not properly construct certain array data structures, which allows remote attackers to cause a denial of service (application crash) via a crafted packet that triggers incorrect memory allocation.</Note>
    </Notes>
    <CVE>CVE-2012-2393</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.3</BaseScore>
        <Vector>AV:A/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-2393.html</URL>
        <Description>CVE-2012-2393</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/763634</URL>
        <Description>SUSE Bug 763634</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/763855</URL>
        <Description>SUSE Bug 763855</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/763857</URL>
        <Description>SUSE Bug 763857</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="36">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Wireshark 1.4.x before 1.4.13 and 1.6.x before 1.6.8 on the SPARC and Itanium platforms does not properly perform data alignment for a certain structure member, which allows remote attackers to cause a denial of service (application crash) via a (1) ICMP or (2) ICMPv6 Echo Request packet.</Note>
    </Notes>
    <CVE>CVE-2012-2394</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.3</BaseScore>
        <Vector>AV:A/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-2394.html</URL>
        <Description>CVE-2012-2394</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/763634</URL>
        <Description>SUSE Bug 763634</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/763859</URL>
        <Description>SUSE Bug 763859</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="37">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The dissect_drda function in epan/dissectors/packet-drda.c in Wireshark 1.6.x through 1.6.10 and 1.8.x through 1.8.2 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a small value for a certain length field in a capture file.</Note>
    </Notes>
    <CVE>CVE-2012-3548</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-3548.html</URL>
        <Description>CVE-2012-3548</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/778000</URL>
        <Description>SUSE Bug 778000</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/783275</URL>
        <Description>SUSE Bug 783275</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="38">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The PPP dissector in Wireshark 1.4.x before 1.4.14, 1.6.x before 1.6.9, and 1.8.x before 1.8.1 allows remote attackers to cause a denial of service (invalid pointer dereference and application crash) via a crafted packet, as demonstrated by a usbmon dump.</Note>
    </Notes>
    <CVE>CVE-2012-4048</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.3</BaseScore>
        <Vector>AV:A/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-4048.html</URL>
        <Description>CVE-2012-4048</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/772738</URL>
        <Description>SUSE Bug 772738</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="39">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">epan/dissectors/packet-nfs.c in the NFS dissector in Wireshark 1.4.x before 1.4.14, 1.6.x before 1.6.9, and 1.8.x before 1.8.1 allows remote attackers to cause a denial of service (loop and CPU consumption) via a crafted packet.</Note>
    </Notes>
    <CVE>CVE-2012-4049</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.9</BaseScore>
        <Vector>AV:A/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-4049.html</URL>
        <Description>CVE-2012-4049</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/772738</URL>
        <Description>SUSE Bug 772738</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="40">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The dissect_pft function in epan/dissectors/packet-dcp-etsi.c in the DCP ETSI dissector in Wireshark 1.4.x before 1.4.15, 1.6.x before 1.6.10, and 1.8.x before 1.8.2 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a zero-length message.</Note>
    </Notes>
    <CVE>CVE-2012-4285</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.3</BaseScore>
        <Vector>AV:A/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-4285.html</URL>
        <Description>CVE-2012-4285</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/776083</URL>
        <Description>SUSE Bug 776083</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="41">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The pcapng_read_packet_block function in wiretap/pcapng.c in the pcap-ng file parser in Wireshark 1.8.x before 1.8.2 allows user-assisted remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted pcap-ng file.</Note>
    </Notes>
    <CVE>CVE-2012-4286</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-4286.html</URL>
        <Description>CVE-2012-4286</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/776083</URL>
        <Description>SUSE Bug 776083</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="42">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">epan/dissectors/packet-mongo.c in the MongoDB dissector in Wireshark 1.8.x before 1.8.2 allows remote attackers to cause a denial of service (loop and CPU consumption) via a small value for a BSON document length.</Note>
    </Notes>
    <CVE>CVE-2012-4287</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-4287.html</URL>
        <Description>CVE-2012-4287</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/776083</URL>
        <Description>SUSE Bug 776083</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="43">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Integer overflow in the dissect_xtp_ecntl function in epan/dissectors/packet-xtp.c in the XTP dissector in Wireshark 1.4.x before 1.4.15, 1.6.x before 1.6.10, and 1.8.x before 1.8.2 allows remote attackers to cause a denial of service (loop or application crash) via a large value for a span length.</Note>
    </Notes>
    <CVE>CVE-2012-4288</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.3</BaseScore>
        <Vector>AV:A/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-4288.html</URL>
        <Description>CVE-2012-4288</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/776083</URL>
        <Description>SUSE Bug 776083</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="44">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">epan/dissectors/packet-afp.c in the AFP dissector in Wireshark 1.4.x before 1.4.15, 1.6.x before 1.6.10, and 1.8.x before 1.8.2 allows remote attackers to cause a denial of service (loop and CPU consumption) via a large number of ACL entries.</Note>
    </Notes>
    <CVE>CVE-2012-4289</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.3</BaseScore>
        <Vector>AV:A/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-4289.html</URL>
        <Description>CVE-2012-4289</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/776083</URL>
        <Description>SUSE Bug 776083</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="45">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The CTDB dissector in Wireshark 1.4.x before 1.4.15, 1.6.x before 1.6.10, and 1.8.x before 1.8.2 allows remote attackers to cause a denial of service (loop and CPU consumption) via a malformed packet.</Note>
    </Notes>
    <CVE>CVE-2012-4290</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.3</BaseScore>
        <Vector>AV:A/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-4290.html</URL>
        <Description>CVE-2012-4290</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/776083</URL>
        <Description>SUSE Bug 776083</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="46">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The CIP dissector in Wireshark 1.4.x before 1.4.15, 1.6.x before 1.6.10, and 1.8.x before 1.8.2 allows remote attackers to cause a denial of service (memory consumption) via a malformed packet.</Note>
    </Notes>
    <CVE>CVE-2012-4291</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.3</BaseScore>
        <Vector>AV:A/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-4291.html</URL>
        <Description>CVE-2012-4291</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/776083</URL>
        <Description>SUSE Bug 776083</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="47">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The dissect_stun_message function in epan/dissectors/packet-stun.c in the STUN dissector in Wireshark 1.4.x before 1.4.15, 1.6.x before 1.6.10, and 1.8.x before 1.8.2 does not properly interact with key-destruction behavior in a certain tree library, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.</Note>
    </Notes>
    <CVE>CVE-2012-4292</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.3</BaseScore>
        <Vector>AV:A/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-4292.html</URL>
        <Description>CVE-2012-4292</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/776083</URL>
        <Description>SUSE Bug 776083</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="48">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">plugins/ethercat/packet-ecatmb.c in the EtherCAT Mailbox dissector in Wireshark 1.4.x before 1.4.15, 1.6.x before 1.6.10, and 1.8.x before 1.8.2 does not properly handle certain integer fields, which allows remote attackers to cause a denial of service (application exit) via a malformed packet.</Note>
    </Notes>
    <CVE>CVE-2012-4293</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.3</BaseScore>
        <Vector>AV:A/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-4293.html</URL>
        <Description>CVE-2012-4293</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/776083</URL>
        <Description>SUSE Bug 776083</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="49">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Buffer overflow in the channelised_fill_sdh_g707_format function in epan/dissectors/packet-erf.c in the ERF dissector in Wireshark 1.8.x before 1.8.2 allows remote attackers to execute arbitrary code via a large speed (aka rate) value.</Note>
    </Notes>
    <CVE>CVE-2012-4294</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.8</BaseScore>
        <Vector>AV:A/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-4294.html</URL>
        <Description>CVE-2012-4294</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/776083</URL>
        <Description>SUSE Bug 776083</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="50">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Array index error in the channelised_fill_sdh_g707_format function in epan/dissectors/packet-erf.c in the ERF dissector in Wireshark 1.8.x before 1.8.2 might allow remote attackers to cause a denial of service (application crash) via a crafted speed (aka rate) value.</Note>
    </Notes>
    <CVE>CVE-2012-4295</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.3</BaseScore>
        <Vector>AV:A/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-4295.html</URL>
        <Description>CVE-2012-4295</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/776083</URL>
        <Description>SUSE Bug 776083</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="51">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Buffer overflow in epan/dissectors/packet-rtps2.c in the RTPS2 dissector in Wireshark 1.4.x before 1.4.15, 1.6.x before 1.6.10, and 1.8.x before 1.8.2 allows remote attackers to cause a denial of service (CPU consumption) via a malformed packet.</Note>
    </Notes>
    <CVE>CVE-2012-4296</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.3</BaseScore>
        <Vector>AV:A/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-4296.html</URL>
        <Description>CVE-2012-4296</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/776083</URL>
        <Description>SUSE Bug 776083</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="52">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Buffer overflow in the dissect_gsm_rlcmac_downlink function in epan/dissectors/packet-gsm_rlcmac.c in the GSM RLC MAC dissector in Wireshark 1.6.x before 1.6.10 and 1.8.x before 1.8.2 allows remote attackers to execute arbitrary code via a malformed packet.</Note>
    </Notes>
    <CVE>CVE-2012-4297</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>8.3</BaseScore>
        <Vector>AV:A/AC:L/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-4297.html</URL>
        <Description>CVE-2012-4297</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/776083</URL>
        <Description>SUSE Bug 776083</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="53">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Integer signedness error in the vwr_read_rec_data_ethernet function in wiretap/vwr.c in the Ixia IxVeriWave file parser in Wireshark 1.8.x before 1.8.2 allows user-assisted remote attackers to execute arbitrary code via a crafted packet-trace file that triggers a buffer overflow.</Note>
    </Notes>
    <CVE>CVE-2012-4298</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.4</BaseScore>
        <Vector>AV:A/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-4298.html</URL>
        <Description>CVE-2012-4298</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/776083</URL>
        <Description>SUSE Bug 776083</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="54">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The dissect_hsrp function in epan/dissectors/packet-hsrp.c in the HSRP dissector in Wireshark 1.8.x before 1.8.3 allows remote attackers to cause a denial of service (infinite loop) via a malformed packet.</Note>
    </Notes>
    <CVE>CVE-2012-5237</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.3</BaseScore>
        <Vector>AV:A/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-5237.html</URL>
        <Description>CVE-2012-5237</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/783275</URL>
        <Description>SUSE Bug 783275</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="55">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">epan/dissectors/packet-ppp.c in the PPP dissector in Wireshark 1.8.x before 1.8.3 uses incorrect OUI data structures during the decoding of (1) PPP and (2) LCP data, which allows remote attackers to cause a denial of service (assertion failure and application exit) via a malformed packet.</Note>
    </Notes>
    <CVE>CVE-2012-5238</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.3</BaseScore>
        <Vector>AV:A/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-5238.html</URL>
        <Description>CVE-2012-5238</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/783275</URL>
        <Description>SUSE Bug 783275</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="56">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2012-3548.  Reason: This candidate is a reservation duplicate of CVE-2012-3548.  Notes: All CVE users should reference CVE-2012-3548 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.</Note>
    </Notes>
    <CVE>CVE-2012-5239</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-5239.html</URL>
        <Description>CVE-2012-5239</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/783275</URL>
        <Description>SUSE Bug 783275</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="57">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Buffer overflow in the dissect_tlv function in epan/dissectors/packet-ldp.c in the LDP dissector in Wireshark 1.8.x before 1.8.3 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a malformed packet.</Note>
    </Notes>
    <CVE>CVE-2012-5240</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.8</BaseScore>
        <Vector>AV:A/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-5240.html</URL>
        <Description>CVE-2012-5240</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/783275</URL>
        <Description>SUSE Bug 783275</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="58">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2012-6052. Reason: This candidate is a reservation duplicate of CVE-2012-6052. Notes: All CVE users should reference CVE-2012-6052 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.</Note>
    </Notes>
    <CVE>CVE-2012-5592</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-5592.html</URL>
        <Description>CVE-2012-5592</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/792005</URL>
        <Description>SUSE Bug 792005</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="59">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2012-6053. Reason: This candidate is a reservation duplicate of CVE-2012-6053. Notes: All CVE users should reference CVE-2012-6053 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.</Note>
    </Notes>
    <CVE>CVE-2012-5593</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-5593.html</URL>
        <Description>CVE-2012-5593</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/792005</URL>
        <Description>SUSE Bug 792005</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="60">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2012-6054. Reason: This candidate is a reservation duplicate of CVE-2012-6054. Notes: All CVE users should reference CVE-2012-6054 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.</Note>
    </Notes>
    <CVE>CVE-2012-5594</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-5594.html</URL>
        <Description>CVE-2012-5594</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/792005</URL>
        <Description>SUSE Bug 792005</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="61">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2012-6056. Reason: This candidate is a reservation duplicate of CVE-2012-6056. Notes: All CVE users should reference CVE-2012-6056 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.</Note>
    </Notes>
    <CVE>CVE-2012-5595</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-5595.html</URL>
        <Description>CVE-2012-5595</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/792005</URL>
        <Description>SUSE Bug 792005</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="62">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2012-6057. Reason: This candidate is a reservation duplicate of CVE-2012-6057. Notes: All CVE users should reference CVE-2012-6057 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.</Note>
    </Notes>
    <CVE>CVE-2012-5596</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-5596.html</URL>
        <Description>CVE-2012-5596</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/792005</URL>
        <Description>SUSE Bug 792005</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="63">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2012-6059. Reason: This candidate is a reservation duplicate of CVE-2012-6059. Notes: All CVE users should reference CVE-2012-6059 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.</Note>
    </Notes>
    <CVE>CVE-2012-5597</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-5597.html</URL>
        <Description>CVE-2012-5597</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/792005</URL>
        <Description>SUSE Bug 792005</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="64">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2012-6060. Reason: This candidate is a reservation duplicate of CVE-2012-6060. Notes: All CVE users should reference CVE-2012-6060 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.</Note>
    </Notes>
    <CVE>CVE-2012-5598</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-5598.html</URL>
        <Description>CVE-2012-5598</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/792005</URL>
        <Description>SUSE Bug 792005</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="65">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2012-6061. Reason: This candidate is a reservation duplicate of CVE-2012-6061. Notes: All CVE users should reference CVE-2012-6061 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.</Note>
    </Notes>
    <CVE>CVE-2012-5599</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-5599.html</URL>
        <Description>CVE-2012-5599</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/792005</URL>
        <Description>SUSE Bug 792005</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="66">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2012-6062. Reason: This candidate is a reservation duplicate of CVE-2012-6062. Notes: All CVE users should reference CVE-2012-6062 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.</Note>
    </Notes>
    <CVE>CVE-2012-5600</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-5600.html</URL>
        <Description>CVE-2012-5600</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/792005</URL>
        <Description>SUSE Bug 792005</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="67">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2012-6055. Reason: This candidate is a reservation duplicate of CVE-2012-6055. Notes: All CVE users should reference CVE-2012-6055 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.</Note>
    </Notes>
    <CVE>CVE-2012-5601</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-5601.html</URL>
        <Description>CVE-2012-5601</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/792005</URL>
        <Description>SUSE Bug 792005</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="68">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2012-6058.  Reason: This candidate is a reservation duplicate of CVE-2012-6058.  Notes: All CVE users should reference CVE-2012-6058 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.</Note>
    </Notes>
    <CVE>CVE-2012-5602</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2012-5602.html</URL>
        <Description>CVE-2012-5602</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/792005</URL>
        <Description>SUSE Bug 792005</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="69">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The dissect_oampdu_event_notification function in epan/dissectors/packet-slowprotocols.c in the IEEE 802.3 Slow Protocols dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly handle certain short lengths, which allows remote attackers to cause a denial of service (infinite loop) via a malformed packet.</Note>
    </Notes>
    <CVE>CVE-2013-1572</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.9</BaseScore>
        <Vector>AV:A/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-1572.html</URL>
        <Description>CVE-2013-1572</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/801131</URL>
        <Description>SUSE Bug 801131</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="70">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The csnStreamDissector function in epan/dissectors/packet-csn1.c in the CSN.1 dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly handle a large number of padding bits, which allows remote attackers to cause a denial of service (infinite loop) via a malformed packet.</Note>
    </Notes>
    <CVE>CVE-2013-1573</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.9</BaseScore>
        <Vector>AV:A/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-1573.html</URL>
        <Description>CVE-2013-1573</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/801131</URL>
        <Description>SUSE Bug 801131</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="71">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The dissect_bthci_eir_ad_data function in epan/dissectors/packet-bthci_cmd.c in the Bluetooth HCI dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 uses an incorrect data type for a counter variable, which allows remote attackers to cause a denial of service (infinite loop) via a malformed packet.</Note>
    </Notes>
    <CVE>CVE-2013-1574</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.9</BaseScore>
        <Vector>AV:A/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-1574.html</URL>
        <Description>CVE-2013-1574</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/801131</URL>
        <Description>SUSE Bug 801131</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="72">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The dissect_r3_cmd_alarmconfigure function in epan/dissectors/packet-assa_r3.c in the R3 dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly handle a certain alarm length, which allows remote attackers to cause a denial of service (infinite loop) via a malformed packet.</Note>
    </Notes>
    <CVE>CVE-2013-1575</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.9</BaseScore>
        <Vector>AV:A/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-1575.html</URL>
        <Description>CVE-2013-1575</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/801131</URL>
        <Description>SUSE Bug 801131</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="73">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The dissect_sdp_media_attribute function in epan/dissectors/packet-sdp.c in the SDP dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly process crypto-suite parameters, which allows remote attackers to cause a denial of service (infinite loop) via a malformed packet.</Note>
    </Notes>
    <CVE>CVE-2013-1576</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.9</BaseScore>
        <Vector>AV:A/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-1576.html</URL>
        <Description>CVE-2013-1576</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/801131</URL>
        <Description>SUSE Bug 801131</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="74">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The dissect_sip_p_charging_func_addresses function in epan/dissectors/packet-sip.c in the SIP dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly handle offset data associated with a quoted string, which allows remote attackers to cause a denial of service (infinite loop) via a malformed packet.</Note>
    </Notes>
    <CVE>CVE-2013-1577</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.9</BaseScore>
        <Vector>AV:A/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-1577.html</URL>
        <Description>CVE-2013-1577</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/801131</URL>
        <Description>SUSE Bug 801131</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="75">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The dissect_pw_eth_heuristic function in epan/dissectors/packet-pw-eth.c in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly handle apparent Ethernet address values at the beginning of MPLS data, which allows remote attackers to cause a denial of service (loop) via a malformed packet.</Note>
    </Notes>
    <CVE>CVE-2013-1578</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.9</BaseScore>
        <Vector>AV:A/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-1578.html</URL>
        <Description>CVE-2013-1578</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/801131</URL>
        <Description>SUSE Bug 801131</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="76">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The rtps_util_add_bitmap function in epan/dissectors/packet-rtps.c in the RTPS dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly implement certain nested loops for processing bitmap data, which allows remote attackers to cause a denial of service (infinite loop) via a malformed packet.</Note>
    </Notes>
    <CVE>CVE-2013-1579</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.9</BaseScore>
        <Vector>AV:A/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-1579.html</URL>
        <Description>CVE-2013-1579</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/801131</URL>
        <Description>SUSE Bug 801131</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="77">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The dissect_cmstatus_tlv function in plugins/docsis/packet-cmstatus.c in the DOCSIS CM-STATUS dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 uses an incorrect data type for a position variable, which allows remote attackers to cause a denial of service (infinite loop) via a malformed packet.</Note>
    </Notes>
    <CVE>CVE-2013-1580</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.9</BaseScore>
        <Vector>AV:A/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-1580.html</URL>
        <Description>CVE-2013-1580</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/801131</URL>
        <Description>SUSE Bug 801131</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="78">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The dissect_pft_fec_detailed function in epan/dissectors/packet-dcp-etsi.c in the DCP-ETSI dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly handle fragment gaps, which allows remote attackers to cause a denial of service (loop) via a malformed packet.</Note>
    </Notes>
    <CVE>CVE-2013-1581</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.9</BaseScore>
        <Vector>AV:A/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-1581.html</URL>
        <Description>CVE-2013-1581</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/801131</URL>
        <Description>SUSE Bug 801131</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="79">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The dissect_clnp function in epan/dissectors/packet-clnp.c in the CLNP dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly manage an offset variable, which allows remote attackers to cause a denial of service (infinite loop or application crash) via a malformed packet.</Note>
    </Notes>
    <CVE>CVE-2013-1582</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.9</BaseScore>
        <Vector>AV:A/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-1582.html</URL>
        <Description>CVE-2013-1582</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/801131</URL>
        <Description>SUSE Bug 801131</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="80">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The dissect_version_4_primary_header function in epan/dissectors/packet-dtn.c in the DTN dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 accesses an inappropriate pointer, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.</Note>
    </Notes>
    <CVE>CVE-2013-1583</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.9</BaseScore>
        <Vector>AV:A/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-1583.html</URL>
        <Description>CVE-2013-1583</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/801131</URL>
        <Description>SUSE Bug 801131</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="81">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The dissect_version_5_and_6_primary_header function in epan/dissectors/packet-dtn.c in the DTN dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 accesses an inappropriate pointer, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.</Note>
    </Notes>
    <CVE>CVE-2013-1584</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.9</BaseScore>
        <Vector>AV:A/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-1584.html</URL>
        <Description>CVE-2013-1584</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/801131</URL>
        <Description>SUSE Bug 801131</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="82">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">epan/tvbuff.c in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly validate certain length values for the MS-MMC dissector, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.</Note>
    </Notes>
    <CVE>CVE-2013-1585</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.9</BaseScore>
        <Vector>AV:A/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-1585.html</URL>
        <Description>CVE-2013-1585</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/801131</URL>
        <Description>SUSE Bug 801131</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="83">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The fragment_set_tot_len function in epan/reassemble.c in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly determine the length of a reassembled packet for the DTLS dissector, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.</Note>
    </Notes>
    <CVE>CVE-2013-1586</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.9</BaseScore>
        <Vector>AV:A/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-1586.html</URL>
        <Description>CVE-2013-1586</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/801131</URL>
        <Description>SUSE Bug 801131</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="84">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The dissect_rohc_ir_packet function in epan/dissectors/packet-rohc.c in the ROHC dissector in Wireshark 1.8.x before 1.8.5 does not properly handle unknown profiles, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.</Note>
    </Notes>
    <CVE>CVE-2013-1587</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.9</BaseScore>
        <Vector>AV:A/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-1587.html</URL>
        <Description>CVE-2013-1587</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/801131</URL>
        <Description>SUSE Bug 801131</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="85">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple buffer overflows in the dissect_pft_fec_detailed function in the DCP-ETSI dissector in epan/dissectors/packet-dcp-etsi.c in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 allow remote attackers to cause a denial of service (application crash) via a malformed packet.</Note>
    </Notes>
    <CVE>CVE-2013-1588</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.9</BaseScore>
        <Vector>AV:A/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-1588.html</URL>
        <Description>CVE-2013-1588</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/801131</URL>
        <Description>SUSE Bug 801131</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="86">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Double free vulnerability in epan/proto.c in the dissection engine in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 allows remote attackers to cause a denial of service (application crash) via a malformed packet.</Note>
    </Notes>
    <CVE>CVE-2013-1589</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.9</BaseScore>
        <Vector>AV:A/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-1589.html</URL>
        <Description>CVE-2013-1589</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/801131</URL>
        <Description>SUSE Bug 801131</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="87">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Buffer overflow in the NTLMSSP dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 allows remote attackers to cause a denial of service (application crash) via a malformed packet.</Note>
    </Notes>
    <CVE>CVE-2013-1590</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.9</BaseScore>
        <Vector>AV:A/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-1590.html</URL>
        <Description>CVE-2013-1590</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/801131</URL>
        <Description>SUSE Bug 801131</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="88">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The TCP dissector in Wireshark 1.8.x before 1.8.6 allows remote attackers to cause a denial of service (application crash) via a malformed packet.</Note>
    </Notes>
    <CVE>CVE-2013-2475</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.3</BaseScore>
        <Vector>AV:A/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-2475.html</URL>
        <Description>CVE-2013-2475</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/807942</URL>
        <Description>SUSE Bug 807942</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="89">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The dissect_hartip function in epan/dissectors/packet-hartip.c in the HART/IP dissector in Wireshark 1.8.x before 1.8.6 allows remote attackers to cause a denial of service (infinite loop) via a packet with a header that is too short.</Note>
    </Notes>
    <CVE>CVE-2013-2476</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.1</BaseScore>
        <Vector>AV:A/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-2476.html</URL>
        <Description>CVE-2013-2476</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/807942</URL>
        <Description>SUSE Bug 807942</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="90">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The CSN.1 dissector in Wireshark 1.8.x before 1.8.6 does not properly manage function pointers, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.</Note>
    </Notes>
    <CVE>CVE-2013-2477</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.3</BaseScore>
        <Vector>AV:A/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-2477.html</URL>
        <Description>CVE-2013-2477</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/807942</URL>
        <Description>SUSE Bug 807942</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="91">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The dissect_server_info function in epan/dissectors/packet-ms-mms.c in the MS-MMS dissector in Wireshark 1.6.x before 1.6.14 and 1.8.x before 1.8.6 does not properly manage string lengths, which allows remote attackers to cause a denial of service (application crash) via a malformed packet that (1) triggers an integer overflow or (2) has embedded '\0' characters in a string.</Note>
    </Notes>
    <CVE>CVE-2013-2478</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.3</BaseScore>
        <Vector>AV:A/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-2478.html</URL>
        <Description>CVE-2013-2478</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/807942</URL>
        <Description>SUSE Bug 807942</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="92">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The dissect_mpls_echo_tlv_dd_map function in epan/dissectors/packet-mpls-echo.c in the MPLS Echo dissector in Wireshark 1.8.x before 1.8.6 allows remote attackers to cause a denial of service (infinite loop) via invalid Sub-tlv data.</Note>
    </Notes>
    <CVE>CVE-2013-2479</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.3</BaseScore>
        <Vector>AV:A/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-2479.html</URL>
        <Description>CVE-2013-2479</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/807942</URL>
        <Description>SUSE Bug 807942</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="93">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The RTPS and RTPS2 dissectors in Wireshark 1.6.x before 1.6.14 and 1.8.x before 1.8.6 allow remote attackers to cause a denial of service (application crash) via a malformed packet.</Note>
    </Notes>
    <CVE>CVE-2013-2480</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.3</BaseScore>
        <Vector>AV:A/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-2480.html</URL>
        <Description>CVE-2013-2480</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/807942</URL>
        <Description>SUSE Bug 807942</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="94">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Integer signedness error in the dissect_mount_dirpath_call function in epan/dissectors/packet-mount.c in the Mount dissector in Wireshark 1.6.x before 1.6.14 and 1.8.x before 1.8.6, when nfs_file_name_snooping is enabled, allows remote attackers to cause a denial of service (application crash) via a negative length value.</Note>
    </Notes>
    <CVE>CVE-2013-2481</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.9</BaseScore>
        <Vector>AV:A/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-2481.html</URL>
        <Description>CVE-2013-2481</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/807942</URL>
        <Description>SUSE Bug 807942</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="95">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The AMPQ dissector in Wireshark 1.6.x before 1.6.14 and 1.8.x before 1.8.6 allows remote attackers to cause a denial of service (infinite loop) via a malformed packet.</Note>
    </Notes>
    <CVE>CVE-2013-2482</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.1</BaseScore>
        <Vector>AV:A/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-2482.html</URL>
        <Description>CVE-2013-2482</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/807942</URL>
        <Description>SUSE Bug 807942</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="96">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The acn_add_dmp_data function in epan/dissectors/packet-acn.c in the ACN dissector in Wireshark 1.6.x before 1.6.14 and 1.8.x before 1.8.6 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via an invalid count value in ACN_DMP_ADT_D_RE DMP data.</Note>
    </Notes>
    <CVE>CVE-2013-2483</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.3</BaseScore>
        <Vector>AV:A/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-2483.html</URL>
        <Description>CVE-2013-2483</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/807942</URL>
        <Description>SUSE Bug 807942</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="97">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The CIMD dissector in Wireshark 1.6.x before 1.6.14 and 1.8.x before 1.8.6 allows remote attackers to cause a denial of service (application crash) via a malformed packet.</Note>
    </Notes>
    <CVE>CVE-2013-2484</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.3</BaseScore>
        <Vector>AV:A/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-2484.html</URL>
        <Description>CVE-2013-2484</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/807942</URL>
        <Description>SUSE Bug 807942</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="98">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The FCSP dissector in Wireshark 1.6.x before 1.6.14 and 1.8.x before 1.8.6 allows remote attackers to cause a denial of service (infinite loop) via a malformed packet.</Note>
    </Notes>
    <CVE>CVE-2013-2485</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.1</BaseScore>
        <Vector>AV:A/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-2485.html</URL>
        <Description>CVE-2013-2485</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/807942</URL>
        <Description>SUSE Bug 807942</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="99">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The dissect_diagnosticrequest function in epan/dissectors/packet-reload.c in the REsource LOcation And Discovery (aka RELOAD) dissector in Wireshark 1.8.x before 1.8.6 uses an incorrect integer data type, which allows remote attackers to cause a denial of service (infinite loop) via crafted integer values in a packet.</Note>
    </Notes>
    <CVE>CVE-2013-2486</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.1</BaseScore>
        <Vector>AV:A/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-2486.html</URL>
        <Description>CVE-2013-2486</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/807942</URL>
        <Description>SUSE Bug 807942</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/820566</URL>
        <Description>SUSE Bug 820566</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/820973</URL>
        <Description>SUSE Bug 820973</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="100">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">epan/dissectors/packet-reload.c in the REsource LOcation And Discovery (aka RELOAD) dissector in Wireshark 1.8.x before 1.8.6 uses incorrect integer data types, which allows remote attackers to cause a denial of service (infinite loop) via crafted integer values in a packet, related to the (1) dissect_icecandidates, (2) dissect_kinddata, (3) dissect_nodeid_list, (4) dissect_storeans, (5) dissect_storereq, (6) dissect_storeddataspecifier, (7) dissect_fetchreq, (8) dissect_findans, (9) dissect_diagnosticinfo, (10) dissect_diagnosticresponse, (11) dissect_reload_messagecontents, and (12) dissect_reload_message functions, a different vulnerability than CVE-2013-2486.</Note>
    </Notes>
    <CVE>CVE-2013-2487</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.8</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-2487.html</URL>
        <Description>CVE-2013-2487</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/807942</URL>
        <Description>SUSE Bug 807942</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/820566</URL>
        <Description>SUSE Bug 820566</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/820973</URL>
        <Description>SUSE Bug 820973</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="101">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The DTLS dissector in Wireshark 1.6.x before 1.6.14 and 1.8.x before 1.8.6 does not validate the fragment offset before invoking the reassembly state machine, which allows remote attackers to cause a denial of service (application crash) via a large offset value that triggers write access to an invalid memory location.</Note>
    </Notes>
    <CVE>CVE-2013-2488</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-2488.html</URL>
        <Description>CVE-2013-2488</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/807942</URL>
        <Description>SUSE Bug 807942</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="102">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">epan/dissectors/packet-gtpv2.c in the GTPv2 dissector in Wireshark 1.8.x before 1.8.7 calls incorrect functions in certain contexts related to ciphers, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.</Note>
    </Notes>
    <CVE>CVE-2013-3555</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-3555.html</URL>
        <Description>CVE-2013-3555</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/820566</URL>
        <Description>SUSE Bug 820566</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/820973</URL>
        <Description>SUSE Bug 820973</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="103">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The fragment_add_seq_common function in epan/reassemble.c in the ASN.1 BER dissector in Wireshark before r48943 has an incorrect pointer dereference during a comparison, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.</Note>
    </Notes>
    <CVE>CVE-2013-3556</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-3556.html</URL>
        <Description>CVE-2013-3556</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/820566</URL>
        <Description>SUSE Bug 820566</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/820973</URL>
        <Description>SUSE Bug 820973</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="104">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The dissect_ber_choice function in epan/dissectors/packet-ber.c in the ASN.1 BER dissector in Wireshark 1.6.x before 1.6.15 and 1.8.x before 1.8.7 does not properly initialize a certain variable, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.</Note>
    </Notes>
    <CVE>CVE-2013-3557</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-3557.html</URL>
        <Description>CVE-2013-3557</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/820566</URL>
        <Description>SUSE Bug 820566</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/820973</URL>
        <Description>SUSE Bug 820973</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="105">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The dissect_ccp_bsdcomp_opt function in epan/dissectors/packet-ppp.c in the PPP CCP dissector in Wireshark 1.8.x before 1.8.7 does not terminate a bit-field list, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.</Note>
    </Notes>
    <CVE>CVE-2013-3558</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-3558.html</URL>
        <Description>CVE-2013-3558</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/820566</URL>
        <Description>SUSE Bug 820566</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/820973</URL>
        <Description>SUSE Bug 820973</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="106">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">epan/dissectors/packet-dcp-etsi.c in the DCP ETSI dissector in Wireshark 1.8.x before 1.8.7 uses incorrect integer data types, which allows remote attackers to cause a denial of service (integer overflow, and heap memory corruption or NULL pointer dereference, and application crash) via a malformed packet.</Note>
    </Notes>
    <CVE>CVE-2013-3559</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-3559.html</URL>
        <Description>CVE-2013-3559</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/820566</URL>
        <Description>SUSE Bug 820566</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/820973</URL>
        <Description>SUSE Bug 820973</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="107">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The dissect_dsmcc_un_download function in epan/dissectors/packet-mpeg-dsmcc.c in the MPEG DSM-CC dissector in Wireshark 1.8.x before 1.8.7 uses an incorrect format string, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.</Note>
    </Notes>
    <CVE>CVE-2013-3560</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-3560.html</URL>
        <Description>CVE-2013-3560</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/820566</URL>
        <Description>SUSE Bug 820566</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/820973</URL>
        <Description>SUSE Bug 820973</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="108">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple integer overflows in Wireshark 1.8.x before 1.8.7 allow remote attackers to cause a denial of service (loop or application crash) via a malformed packet, related to a crash of the Websocket dissector, an infinite loop in the MySQL dissector, and a large loop in the ETCH dissector.</Note>
    </Notes>
    <CVE>CVE-2013-3561</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.8</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-3561.html</URL>
        <Description>CVE-2013-3561</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/820566</URL>
        <Description>SUSE Bug 820566</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/820973</URL>
        <Description>SUSE Bug 820973</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="109">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple integer signedness errors in the tvb_unmasked function in epan/dissectors/packet-websocket.c in the Websocket dissector in Wireshark 1.8.x before 1.8.7 allow remote attackers to cause a denial of service (application crash) via a malformed packet.</Note>
    </Notes>
    <CVE>CVE-2013-3562</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-3562.html</URL>
        <Description>CVE-2013-3562</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/820566</URL>
        <Description>SUSE Bug 820566</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/820973</URL>
        <Description>SUSE Bug 820973</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="110">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The dissect_pft function in epan/dissectors/packet-dcp-etsi.c in the DCP ETSI dissector in Wireshark 1.6.x before 1.6.16, 1.8.x before 1.8.8, and 1.10.0 does not validate a certain fragment length value, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.</Note>
    </Notes>
    <CVE>CVE-2013-4083</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-4083.html</URL>
        <Description>CVE-2013-4083</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/824900</URL>
        <Description>SUSE Bug 824900</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/831718</URL>
        <Description>SUSE Bug 831718</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="111">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The P1 dissector in Wireshark 1.10.x before 1.10.1 does not properly initialize a global variable, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.</Note>
    </Notes>
    <CVE>CVE-2013-4920</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-4920.html</URL>
        <Description>CVE-2013-4920</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/831718</URL>
        <Description>SUSE Bug 831718</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="112">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Off-by-one error in the dissect_radiotap function in epan/dissectors/packet-ieee80211-radiotap.c in the Radiotap dissector in Wireshark 1.10.x before 1.10.1 allows remote attackers to cause a denial of service (application crash) via a crafted packet.</Note>
    </Notes>
    <CVE>CVE-2013-4921</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-4921.html</URL>
        <Description>CVE-2013-4921</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/831718</URL>
        <Description>SUSE Bug 831718</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="113">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Double free vulnerability in the dissect_dcom_ActivationProperties function in epan/dissectors/packet-dcom-sysact.c in the DCOM ISystemActivator dissector in Wireshark 1.10.x before 1.10.1 allows remote attackers to cause a denial of service (application crash) via a crafted packet.</Note>
    </Notes>
    <CVE>CVE-2013-4922</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-4922.html</URL>
        <Description>CVE-2013-4922</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/831718</URL>
        <Description>SUSE Bug 831718</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="114">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Memory leak in the dissect_dcom_ActivationProperties function in epan/dissectors/packet-dcom-sysact.c in the DCOM ISystemActivator dissector in Wireshark 1.10.x before 1.10.1 allows remote attackers to cause a denial of service (memory consumption) via crafted packets.</Note>
    </Notes>
    <CVE>CVE-2013-4923</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-4923.html</URL>
        <Description>CVE-2013-4923</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/831718</URL>
        <Description>SUSE Bug 831718</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="115">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">epan/dissectors/packet-dcom-sysact.c in the DCOM ISystemActivator dissector in Wireshark 1.10.x before 1.10.1 does not properly validate certain index values, which allows remote attackers to cause a denial of service (assertion failure and application exit) via a crafted packet.</Note>
    </Notes>
    <CVE>CVE-2013-4924</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-4924.html</URL>
        <Description>CVE-2013-4924</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/831718</URL>
        <Description>SUSE Bug 831718</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="116">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Integer signedness error in epan/dissectors/packet-dcom-sysact.c in the DCOM ISystemActivator dissector in Wireshark 1.10.x before 1.10.1 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a crafted packet.</Note>
    </Notes>
    <CVE>CVE-2013-4925</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-4925.html</URL>
        <Description>CVE-2013-4925</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/831718</URL>
        <Description>SUSE Bug 831718</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="117">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">epan/dissectors/packet-dcom-sysact.c in the DCOM ISystemActivator dissector in Wireshark 1.10.x before 1.10.1 does not properly determine whether there is remaining packet data to process, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.</Note>
    </Notes>
    <CVE>CVE-2013-4926</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-4926.html</URL>
        <Description>CVE-2013-4926</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/831718</URL>
        <Description>SUSE Bug 831718</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="118">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Integer signedness error in the get_type_length function in epan/dissectors/packet-btsdp.c in the Bluetooth SDP dissector in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 allows remote attackers to cause a denial of service (loop and CPU consumption) via a crafted packet.</Note>
    </Notes>
    <CVE>CVE-2013-4927</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.8</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-4927.html</URL>
        <Description>CVE-2013-4927</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/831718</URL>
        <Description>SUSE Bug 831718</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="119">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Integer signedness error in the dissect_headers function in epan/dissectors/packet-btobex.c in the Bluetooth OBEX dissector in Wireshark 1.10.x before 1.10.1 allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.</Note>
    </Notes>
    <CVE>CVE-2013-4928</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.8</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-4928.html</URL>
        <Description>CVE-2013-4928</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/831718</URL>
        <Description>SUSE Bug 831718</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="120">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The parseFields function in epan/dissectors/packet-dis-pdus.c in the DIS dissector in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not terminate packet-data processing after finding zero remaining bytes, which allows remote attackers to cause a denial of service (loop) via a crafted packet.</Note>
    </Notes>
    <CVE>CVE-2013-4929</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.8</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-4929.html</URL>
        <Description>CVE-2013-4929</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/831718</URL>
        <Description>SUSE Bug 831718</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="121">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The dissect_dvbci_tpdu_hdr function in epan/dissectors/packet-dvbci.c in the DVB-CI dissector in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not validate a certain length value before decrementing it, which allows remote attackers to cause a denial of service (assertion failure and application exit) via a crafted packet.</Note>
    </Notes>
    <CVE>CVE-2013-4930</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-4930.html</URL>
        <Description>CVE-2013-4930</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/831718</URL>
        <Description>SUSE Bug 831718</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="122">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">epan/proto.c in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 allows remote attackers to cause a denial of service (loop) via a crafted packet that is not properly handled by the GSM RR dissector.</Note>
    </Notes>
    <CVE>CVE-2013-4931</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-4931.html</URL>
        <Description>CVE-2013-4931</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/831718</URL>
        <Description>SUSE Bug 831718</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="123">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple array index errors in epan/dissectors/packet-gsm_a_common.c in the GSM A Common dissector in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 allow remote attackers to cause a denial of service (application crash) via a crafted packet.</Note>
    </Notes>
    <CVE>CVE-2013-4932</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-4932.html</URL>
        <Description>CVE-2013-4932</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/831718</URL>
        <Description>SUSE Bug 831718</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="124">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The netmon_open function in wiretap/netmon.c in the Netmon file parser in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not properly allocate memory, which allows remote attackers to cause a denial of service (application crash) via a crafted packet-trace file.</Note>
    </Notes>
    <CVE>CVE-2013-4933</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-4933.html</URL>
        <Description>CVE-2013-4933</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/831718</URL>
        <Description>SUSE Bug 831718</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="125">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The netmon_open function in wiretap/netmon.c in the Netmon file parser in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not initialize certain structure members, which allows remote attackers to cause a denial of service (application crash) via a crafted packet-trace file.</Note>
    </Notes>
    <CVE>CVE-2013-4934</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-4934.html</URL>
        <Description>CVE-2013-4934</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/831718</URL>
        <Description>SUSE Bug 831718</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="126">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The dissect_per_length_determinant function in epan/dissectors/packet-per.c in the ASN.1 PER dissector in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not initialize a length field in certain abnormal situations, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.</Note>
    </Notes>
    <CVE>CVE-2013-4935</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-4935.html</URL>
        <Description>CVE-2013-4935</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/831718</URL>
        <Description>SUSE Bug 831718</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="127">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The IsDFP_Frame function in plugins/profinet/packet-pn-rt.c in the PROFINET Real-Time dissector in Wireshark 1.10.x before 1.10.1 does not validate MAC addresses, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted packet.</Note>
    </Notes>
    <CVE>CVE-2013-4936</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-4936.html</URL>
        <Description>CVE-2013-4936</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/831718</URL>
        <Description>SUSE Bug 831718</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="128">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The Bluetooth HCI ACL dissector in Wireshark 1.10.x before 1.10.2 does not properly maintain a certain free list, which allows remote attackers to cause a denial of service (application crash) via a crafted packet that is not properly handled by the wmem_block_alloc function in epan/wmem/wmem_allocator_block.c.</Note>
    </Notes>
    <CVE>CVE-2013-5717</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-5717.html</URL>
        <Description>CVE-2013-5717</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/839607</URL>
        <Description>SUSE Bug 839607</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="129">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The dissect_nbap_T_dCH_ID function in epan/dissectors/packet-nbap.c in the NBAP dissector in Wireshark 1.8.x before 1.8.10 and 1.10.x before 1.10.2 does not restrict the dch_id value, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.</Note>
    </Notes>
    <CVE>CVE-2013-5718</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-5718.html</URL>
        <Description>CVE-2013-5718</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/839607</URL>
        <Description>SUSE Bug 839607</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="130">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">epan/dissectors/packet-assa_r3.c in the ASSA R3 dissector in Wireshark 1.8.x before 1.8.10 and 1.10.x before 1.10.2 allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.</Note>
    </Notes>
    <CVE>CVE-2013-5719</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-5719.html</URL>
        <Description>CVE-2013-5719</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/839607</URL>
        <Description>SUSE Bug 839607</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="131">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Buffer overflow in the RTPS dissector in Wireshark 1.8.x before 1.8.10 and 1.10.x before 1.10.2 allows remote attackers to cause a denial of service (application crash) via a crafted packet.</Note>
    </Notes>
    <CVE>CVE-2013-5720</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-5720.html</URL>
        <Description>CVE-2013-5720</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/839607</URL>
        <Description>SUSE Bug 839607</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="132">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The dissect_mq_rr function in epan/dissectors/packet-mq.c in the MQ dissector in Wireshark 1.8.x before 1.8.10 and 1.10.x before 1.10.2 does not properly determine when to enter a certain loop, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.</Note>
    </Notes>
    <CVE>CVE-2013-5721</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-5721.html</URL>
        <Description>CVE-2013-5721</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/839607</URL>
        <Description>SUSE Bug 839607</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="133">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in the LDAP dissector in Wireshark 1.8.x before 1.8.10 and 1.10.x before 1.10.2 allows remote attackers to cause a denial of service (application crash) via a crafted packet.</Note>
    </Notes>
    <CVE>CVE-2013-5722</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-5722.html</URL>
        <Description>CVE-2013-5722</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/839607</URL>
        <Description>SUSE Bug 839607</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="134">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ieee802154_map_rec function in epan/dissectors/packet-ieee802154.c in the IEEE 802.15.4 dissector in Wireshark 1.8.x before 1.8.11 and 1.10.x before 1.10.3 uses an incorrect pointer chain, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.</Note>
    </Notes>
    <CVE>CVE-2013-6336</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-6336.html</URL>
        <Description>CVE-2013-6336</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/848738</URL>
        <Description>SUSE Bug 848738</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="135">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Unspecified vulnerability in the NBAP dissector in Wireshark 1.8.x before 1.8.11 and 1.10.x before 1.10.3 allows remote attackers to cause a denial of service (application crash) via a crafted packet.</Note>
    </Notes>
    <CVE>CVE-2013-6337</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-6337.html</URL>
        <Description>CVE-2013-6337</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/848738</URL>
        <Description>SUSE Bug 848738</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="136">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The dissect_sip_common function in epan/dissectors/packet-sip.c in the SIP dissector in Wireshark 1.8.x before 1.8.11 and 1.10.x before 1.10.3 does not properly initialize a data structure, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.</Note>
    </Notes>
    <CVE>CVE-2013-6338</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-6338.html</URL>
        <Description>CVE-2013-6338</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/848738</URL>
        <Description>SUSE Bug 848738</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="137">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The dissect_openwire_type function in epan/dissectors/packet-openwire.c in the OpenWire dissector in Wireshark 1.8.x before 1.8.11 and 1.10.x before 1.10.3 allows remote attackers to cause a denial of service (loop) via a crafted packet.</Note>
    </Notes>
    <CVE>CVE-2013-6339</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-6339.html</URL>
        <Description>CVE-2013-6339</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/848738</URL>
        <Description>SUSE Bug 848738</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="138">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">epan/dissectors/packet-tcp.c in the TCP dissector in Wireshark 1.8.x before 1.8.11 and 1.10.x before 1.10.3 does not properly determine the amount of remaining data, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.</Note>
    </Notes>
    <CVE>CVE-2013-6340</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-6340.html</URL>
        <Description>CVE-2013-6340</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/848738</URL>
        <Description>SUSE Bug 848738</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="139">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The dissect_sip_common function in epan/dissectors/packet-sip.c in the SIP dissector in Wireshark 1.8.x before 1.8.12 and 1.10.x before 1.10.4 does not check for empty lines, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.</Note>
    </Notes>
    <CVE>CVE-2013-7112</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-7112.html</URL>
        <Description>CVE-2013-7112</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/856498</URL>
        <Description>SUSE Bug 856498</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="140">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">epan/dissectors/packet-bssgp.c in the BSSGP dissector in Wireshark 1.10.x before 1.10.4 incorrectly relies on a global variable, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.</Note>
    </Notes>
    <CVE>CVE-2013-7113</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-7113.html</URL>
        <Description>CVE-2013-7113</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/856495</URL>
        <Description>SUSE Bug 856495</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="141">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple buffer overflows in the create_ntlmssp_v2_key function in epan/dissectors/packet-ntlmssp.c in the NTLMSSP v2 dissector in Wireshark 1.8.x before 1.8.12 and 1.10.x before 1.10.4 allow remote attackers to cause a denial of service (application crash) via a long domain name in a packet.</Note>
    </Notes>
    <CVE>CVE-2013-7114</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:C</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-7114.html</URL>
        <Description>CVE-2013-7114</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/856496</URL>
        <Description>SUSE Bug 856496</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="142">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The nfs_name_snoop_add_name function in epan/dissectors/packet-nfs.c in the NFS dissector in Wireshark 1.8.x before 1.8.13 and 1.10.x before 1.10.6 does not validate a certain length value, which allows remote attackers to cause a denial of service (memory corruption and application crash) via a crafted NFS packet.</Note>
    </Notes>
    <CVE>CVE-2014-2281</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-2281.html</URL>
        <Description>CVE-2014-2281</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/867485</URL>
        <Description>SUSE Bug 867485</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="143">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The dissect_protocol_data_parameter function in epan/dissectors/packet-m3ua.c in the M3UA dissector in Wireshark 1.10.x before 1.10.6 does not properly allocate memory, which allows remote attackers to cause a denial of service (application crash) via a crafted SS7 MTP3 packet.</Note>
    </Notes>
    <CVE>CVE-2014-2282</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-2282.html</URL>
        <Description>CVE-2014-2282</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/867485</URL>
        <Description>SUSE Bug 867485</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="144">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">epan/dissectors/packet-rlc in the RLC dissector in Wireshark 1.8.x before 1.8.13 and 1.10.x before 1.10.6 uses inconsistent memory-management approaches, which allows remote attackers to cause a denial of service (use-after-free error and application crash) via a crafted UMTS Radio Link Control packet.</Note>
    </Notes>
    <CVE>CVE-2014-2283</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-2283.html</URL>
        <Description>CVE-2014-2283</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/867485</URL>
        <Description>SUSE Bug 867485</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="145">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Buffer overflow in the mpeg_read function in wiretap/mpeg.c in the MPEG parser in Wireshark 1.8.x before 1.8.13 and 1.10.x before 1.10.6 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a large record in MPEG data.</Note>
    </Notes>
    <CVE>CVE-2014-2299</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>9.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-2299.html</URL>
        <Description>CVE-2014-2299</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/867485</URL>
        <Description>SUSE Bug 867485</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="146">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The srtp_add_address function in epan/dissectors/packet-rtp.c in the RTP dissector in Wireshark 1.10.x before 1.10.7 does not properly update SRTP conversation data, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.</Note>
    </Notes>
    <CVE>CVE-2014-2907</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-2907.html</URL>
        <Description>CVE-2014-2907</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/874693</URL>
        <Description>SUSE Bug 874693</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/874760</URL>
        <Description>SUSE Bug 874760</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="147">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The dissect_frame function in epan/dissectors/packet-frame.c in the frame metadissector in Wireshark 1.10.x before 1.10.8 interprets a negative integer as a length value even though it was intended to represent an error condition, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.</Note>
    </Notes>
    <CVE>CVE-2014-4020</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-4020.html</URL>
        <Description>CVE-2014-4020</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/882602</URL>
        <Description>SUSE Bug 882602</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="148">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The dissect_log function in plugins/irda/packet-irda.c in the IrDA dissector in Wireshark 1.10.x before 1.10.9 does not properly strip '\n' characters, which allows remote attackers to cause a denial of service (buffer underflow and application crash) via a crafted packet.</Note>
    </Notes>
    <CVE>CVE-2014-5161</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-5161.html</URL>
        <Description>CVE-2014-5161</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/889854</URL>
        <Description>SUSE Bug 889854</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/889901</URL>
        <Description>SUSE Bug 889901</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="149">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The read_new_line function in wiretap/catapult_dct2000.c in the Catapult DCT2000 dissector in Wireshark 1.10.x before 1.10.9 does not properly strip '\n' and '\r' characters, which allows remote attackers to cause a denial of service (off-by-one buffer underflow and application crash) via a crafted packet.</Note>
    </Notes>
    <CVE>CVE-2014-5162</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-5162.html</URL>
        <Description>CVE-2014-5162</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/889854</URL>
        <Description>SUSE Bug 889854</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/889901</URL>
        <Description>SUSE Bug 889901</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="150">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The APN decode functionality in (1) epan/dissectors/packet-gtp.c and (2) epan/dissectors/packet-gsm_a_gm.c in the GTP and GSM Management dissectors in Wireshark 1.10.x before 1.10.9 does not completely initialize a certain buffer, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.</Note>
    </Notes>
    <CVE>CVE-2014-5163</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-5163.html</URL>
        <Description>CVE-2014-5163</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/889854</URL>
        <Description>SUSE Bug 889854</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/889906</URL>
        <Description>SUSE Bug 889906</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="151">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The rlc_decode_li function in epan/dissectors/packet-rlc.c in the RLC dissector in Wireshark 1.10.x before 1.10.9 initializes a certain structure member only after this member is used, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.</Note>
    </Notes>
    <CVE>CVE-2014-5164</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-5164.html</URL>
        <Description>CVE-2014-5164</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/889854</URL>
        <Description>SUSE Bug 889854</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/889900</URL>
        <Description>SUSE Bug 889900</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="152">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The dissect_ber_constrained_bitstring function in epan/dissectors/packet-ber.c in the ASN.1 BER dissector in Wireshark 1.10.x before 1.10.9 does not properly validate padding values, which allows remote attackers to cause a denial of service (buffer underflow and application crash) via a crafted packet.</Note>
    </Notes>
    <CVE>CVE-2014-5165</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-5165.html</URL>
        <Description>CVE-2014-5165</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/889854</URL>
        <Description>SUSE Bug 889854</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/889899</URL>
        <Description>SUSE Bug 889899</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="153">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The tvb_raw_text_add function in epan/dissectors/packet-megaco.c in the MEGACO dissector in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 allows remote attackers to cause a denial of service (infinite loop) via an empty line.</Note>
    </Notes>
    <CVE>CVE-2014-6423</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-6423.html</URL>
        <Description>CVE-2014-6423</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/897055</URL>
        <Description>SUSE Bug 897055</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="154">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The dissect_v9_v10_pdu_data function in epan/dissectors/packet-netflow.c in the Netflow dissector in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 refers to incorrect offset and start variables, which allows remote attackers to cause a denial of service (uninitialized memory read and application crash) via a crafted packet.</Note>
    </Notes>
    <CVE>CVE-2014-6424</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-6424.html</URL>
        <Description>CVE-2014-6424</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/897055</URL>
        <Description>SUSE Bug 897055</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="155">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The (1) get_quoted_string and (2) get_unquoted_string functions in epan/dissectors/packet-cups.c in the CUPS dissector in Wireshark 1.12.x before 1.12.1 allow remote attackers to cause a denial of service (buffer over-read and application crash) via a CUPS packet that lacks a trailing '\0' character.</Note>
    </Notes>
    <CVE>CVE-2014-6425</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-6425.html</URL>
        <Description>CVE-2014-6425</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="156">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The dissect_hip_tlv function in epan/dissectors/packet-hip.c in the HIP dissector in Wireshark 1.12.x before 1.12.1 does not properly handle a NULL tree, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.</Note>
    </Notes>
    <CVE>CVE-2014-6426</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-6426.html</URL>
        <Description>CVE-2014-6426</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="157">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Off-by-one error in the is_rtsp_request_or_reply function in epan/dissectors/packet-rtsp.c in the RTSP dissector in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 allows remote attackers to cause a denial of service (application crash) via a crafted packet that triggers parsing of a token located one position beyond the current position.</Note>
    </Notes>
    <CVE>CVE-2014-6427</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-6427.html</URL>
        <Description>CVE-2014-6427</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/897055</URL>
        <Description>SUSE Bug 897055</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="158">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The dissect_spdu function in epan/dissectors/packet-ses.c in the SES dissector in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 does not initialize a certain ID value, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.</Note>
    </Notes>
    <CVE>CVE-2014-6428</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-6428.html</URL>
        <Description>CVE-2014-6428</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/897055</URL>
        <Description>SUSE Bug 897055</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="159">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The SnifferDecompress function in wiretap/ngsniffer.c in the DOS Sniffer file parser in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 does not properly handle empty input data, which allows remote attackers to cause a denial of service (application crash) via a crafted file.</Note>
    </Notes>
    <CVE>CVE-2014-6429</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-6429.html</URL>
        <Description>CVE-2014-6429</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/897055</URL>
        <Description>SUSE Bug 897055</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="160">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The SnifferDecompress function in wiretap/ngsniffer.c in the DOS Sniffer file parser in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 does not validate bitmask data, which allows remote attackers to cause a denial of service (application crash) via a crafted file.</Note>
    </Notes>
    <CVE>CVE-2014-6430</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-6430.html</URL>
        <Description>CVE-2014-6430</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/897055</URL>
        <Description>SUSE Bug 897055</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="161">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Buffer overflow in the SnifferDecompress function in wiretap/ngsniffer.c in the DOS Sniffer file parser in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 allows remote attackers to cause a denial of service (application crash) via a crafted file that triggers writes of uncompressed bytes beyond the end of the output buffer.</Note>
    </Notes>
    <CVE>CVE-2014-6431</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-6431.html</URL>
        <Description>CVE-2014-6431</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/897055</URL>
        <Description>SUSE Bug 897055</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="162">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The SnifferDecompress function in wiretap/ngsniffer.c in the DOS Sniffer file parser in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 does not prevent data overwrites during copy operations, which allows remote attackers to cause a denial of service (application crash) via a crafted file.</Note>
    </Notes>
    <CVE>CVE-2014-6432</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-6432.html</URL>
        <Description>CVE-2014-6432</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/897055</URL>
        <Description>SUSE Bug 897055</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="163">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The decompress_sigcomp_message function in epan/sigcomp-udvm.c in the SigComp UDVM dissector in Wireshark 1.10.x before 1.10.11 allows remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted packet.</Note>
    </Notes>
    <CVE>CVE-2014-8710</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-8710.html</URL>
        <Description>CVE-2014-8710</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/905246</URL>
        <Description>SUSE Bug 905246</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="164">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple integer overflows in epan/dissectors/packet-amqp.c in the AMQP dissector in Wireshark 1.10.x before 1.10.11 and 1.12.x before 1.12.2 allow remote attackers to cause a denial of service (application crash) via a crafted amqp_0_10 PDU in a packet.</Note>
    </Notes>
    <CVE>CVE-2014-8711</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-8711.html</URL>
        <Description>CVE-2014-8711</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/905245</URL>
        <Description>SUSE Bug 905245</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="165">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The build_expert_data function in epan/dissectors/packet-ncp2222.inc in the NCP dissector in Wireshark 1.10.x before 1.10.11 and 1.12.x before 1.12.2 does not properly initialize a data structure, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.</Note>
    </Notes>
    <CVE>CVE-2014-8712</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-8712.html</URL>
        <Description>CVE-2014-8712</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/905248</URL>
        <Description>SUSE Bug 905248</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="166">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Stack-based buffer overflow in the build_expert_data function in epan/dissectors/packet-ncp2222.inc in the NCP dissector in Wireshark 1.10.x before 1.10.11 and 1.12.x before 1.12.2 allows remote attackers to cause a denial of service (application crash) via a crafted packet.</Note>
    </Notes>
    <CVE>CVE-2014-8713</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-8713.html</URL>
        <Description>CVE-2014-8713</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/905248</URL>
        <Description>SUSE Bug 905248</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="167">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The dissect_write_structured_field function in epan/dissectors/packet-tn5250.c in the TN5250 dissector in Wireshark 1.10.x before 1.10.11 and 1.12.x before 1.12.2 allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.</Note>
    </Notes>
    <CVE>CVE-2014-8714</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-8714.html</URL>
        <Description>CVE-2014-8714</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/905247</URL>
        <Description>SUSE Bug 905247</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="168">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple use-after-free vulnerabilities in epan/dissectors/packet-wccp.c in the WCCP dissector in Wireshark 1.10.x before 1.10.12 and 1.12.x before 1.12.3 allow remote attackers to cause a denial of service (application crash) via a crafted packet, related to the use of packet-scope memory instead of pinfo-scope memory.</Note>
    </Notes>
    <CVE>CVE-2015-0559</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-0559.html</URL>
        <Description>CVE-2015-0559</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/912365</URL>
        <Description>SUSE Bug 912365</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="169">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The dissect_wccp2r1_address_table_info function in epan/dissectors/packet-wccp.c in the WCCP dissector in Wireshark 1.10.x before 1.10.12 and 1.12.x before 1.12.3 does not initialize certain data structures, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.</Note>
    </Notes>
    <CVE>CVE-2015-0560</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-0560.html</URL>
        <Description>CVE-2015-0560</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/912365</URL>
        <Description>SUSE Bug 912365</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="170">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">asn1/lpp/lpp.cnf in the LPP dissector in Wireshark 1.10.x before 1.10.12 and 1.12.x before 1.12.3 does not validate a certain index value, which allows remote attackers to cause a denial of service (out-of-bounds memory access and application crash) via a crafted packet.</Note>
    </Notes>
    <CVE>CVE-2015-0561</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-0561.html</URL>
        <Description>CVE-2015-0561</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/912368</URL>
        <Description>SUSE Bug 912368</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="171">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple use-after-free vulnerabilities in epan/dissectors/packet-dec-dnart.c in the DEC DNA Routing Protocol dissector in Wireshark 1.10.x before 1.10.12 and 1.12.x before 1.12.3 allow remote attackers to cause a denial of service (application crash) via a crafted packet, related to the use of packet-scope memory instead of pinfo-scope memory.</Note>
    </Notes>
    <CVE>CVE-2015-0562</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-0562.html</URL>
        <Description>CVE-2015-0562</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/912369</URL>
        <Description>SUSE Bug 912369</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="172">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">epan/dissectors/packet-smtp.c in the SMTP dissector in Wireshark 1.10.x before 1.10.12 and 1.12.x before 1.12.3 uses an incorrect length value for certain string-append operations, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.</Note>
    </Notes>
    <CVE>CVE-2015-0563</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-0563.html</URL>
        <Description>CVE-2015-0563</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/912370</URL>
        <Description>SUSE Bug 912370</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="173">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Buffer underflow in the ssl_decrypt_record function in epan/dissectors/packet-ssl-utils.c in Wireshark 1.10.x before 1.10.12 and 1.12.x before 1.12.3 allows remote attackers to cause a denial of service (application crash) via a crafted packet that is improperly handled during decryption of an SSL session.</Note>
    </Notes>
    <CVE>CVE-2015-0564</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-0564.html</URL>
        <Description>CVE-2015-0564</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/912372</URL>
        <Description>SUSE Bug 912372</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="174">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The dissect_atn_cpdlc_heur function in asn1/atn-cpdlc/packet-atn-cpdlc-template.c in the ATN-CPDLC dissector in Wireshark 1.12.x before 1.12.4 does not properly follow the TRY/ENDTRY code requirements, which allows remote attackers to cause a denial of service (stack memory corruption and application crash) via a crafted packet.</Note>
    </Notes>
    <CVE>CVE-2015-2187</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-2187.html</URL>
        <Description>CVE-2015-2187</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/920695</URL>
        <Description>SUSE Bug 920695</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="175">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">epan/dissectors/packet-wcp.c in the WCP dissector in Wireshark 1.10.x before 1.10.13 and 1.12.x before 1.12.4 does not properly initialize a data structure, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet that is improperly handled during decompression.</Note>
    </Notes>
    <CVE>CVE-2015-2188</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-2188.html</URL>
        <Description>CVE-2015-2188</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/920696</URL>
        <Description>SUSE Bug 920696</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="176">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Off-by-one error in the pcapng_read function in wiretap/pcapng.c in the pcapng file parser in Wireshark 1.10.x before 1.10.13 and 1.12.x before 1.12.4 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via an invalid Interface Statistics Block (ISB) interface ID in a crafted packet.</Note>
    </Notes>
    <CVE>CVE-2015-2189</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-2189.html</URL>
        <Description>CVE-2015-2189</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/920697</URL>
        <Description>SUSE Bug 920697</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="177">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">epan/proto.c in Wireshark 1.12.x before 1.12.4 does not properly handle integer data types greater than 32 bits in size, which allows remote attackers to cause a denial of service (assertion failure and application exit) via a crafted packet that is improperly handled by the LLDP dissector.</Note>
    </Notes>
    <CVE>CVE-2015-2190</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-2190.html</URL>
        <Description>CVE-2015-2190</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/920698</URL>
        <Description>SUSE Bug 920698</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="178">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Integer overflow in the dissect_tnef function in epan/dissectors/packet-tnef.c in the TNEF dissector in Wireshark 1.10.x before 1.10.13 and 1.12.x before 1.12.4 allows remote attackers to cause a denial of service (infinite loop) via a crafted length field in a packet.</Note>
    </Notes>
    <CVE>CVE-2015-2191</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-2191.html</URL>
        <Description>CVE-2015-2191</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/920699</URL>
        <Description>SUSE Bug 920699</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="179">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Integer overflow in the dissect_osd2_cdb_continuation function in epan/dissectors/packet-scsi-osd.c in the SCSI OSD dissector in Wireshark 1.12.x before 1.12.4 allows remote attackers to cause a denial of service (infinite loop) via a crafted length field in a packet.</Note>
    </Notes>
    <CVE>CVE-2015-2192</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-2192.html</URL>
        <Description>CVE-2015-2192</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/920700</URL>
        <Description>SUSE Bug 920700</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="180">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The dissect_lbmr_pser function in epan/dissectors/packet-lbmr.c in the LBMR dissector in Wireshark 1.12.x before 1.12.5 does not reject a zero length, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.</Note>
    </Notes>
    <CVE>CVE-2015-3808</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>7.8</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-3808.html</URL>
        <Description>CVE-2015-3808</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/930689</URL>
        <Description>SUSE Bug 930689</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="181">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The dissect_lbmr_pser function in epan/dissectors/packet-lbmr.c in the LBMR dissector in Wireshark 1.12.x before 1.12.5 does not properly track the current offset, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.</Note>
    </Notes>
    <CVE>CVE-2015-3809</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.8</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-3809.html</URL>
        <Description>CVE-2015-3809</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/930689</URL>
        <Description>SUSE Bug 930689</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="182">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">epan/dissectors/packet-websocket.c in the WebSocket dissector in Wireshark 1.12.x before 1.12.5 uses a recursive algorithm, which allows remote attackers to cause a denial of service (CPU consumption) via a crafted packet.</Note>
    </Notes>
    <CVE>CVE-2015-3810</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.8</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-3810.html</URL>
        <Description>CVE-2015-3810</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/930689</URL>
        <Description>SUSE Bug 930689</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="183">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">epan/dissectors/packet-wcp.c in the WCP dissector in Wireshark 1.10.x before 1.10.14 and 1.12.x before 1.12.5 improperly refers to previously processed bytes, which allows remote attackers to cause a denial of service (application crash) via a crafted packet, a different vulnerability than CVE-2015-2188.</Note>
    </Notes>
    <CVE>CVE-2015-3811</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-3811.html</URL>
        <Description>CVE-2015-3811</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/930689</URL>
        <Description>SUSE Bug 930689</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/930691</URL>
        <Description>SUSE Bug 930691</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="184">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple memory leaks in the x11_init_protocol function in epan/dissectors/packet-x11.c in the X11 dissector in Wireshark 1.10.x before 1.10.14 and 1.12.x before 1.12.5 allow remote attackers to cause a denial of service (memory consumption) via a crafted packet.</Note>
    </Notes>
    <CVE>CVE-2015-3812</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.8</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-3812.html</URL>
        <Description>CVE-2015-3812</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/930689</URL>
        <Description>SUSE Bug 930689</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/930691</URL>
        <Description>SUSE Bug 930691</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="185">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The fragment_add_work function in epan/reassemble.c in the packet-reassembly feature in Wireshark 1.12.x before 1.12.5 does not properly determine the defragmentation state in a case of an insufficient snapshot length, which allows remote attackers to cause a denial of service (memory consumption) via a crafted packet.</Note>
    </Notes>
    <CVE>CVE-2015-3813</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.1</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-3813.html</URL>
        <Description>CVE-2015-3813</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/930689</URL>
        <Description>SUSE Bug 930689</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="186">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The (1) dissect_tfs_request and (2) dissect_tfs_response functions in epan/dissectors/packet-ieee80211.c in the IEEE 802.11 dissector in Wireshark 1.10.x before 1.10.14 and 1.12.x before 1.12.5 interpret a zero value as a length rather than an error condition, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.</Note>
    </Notes>
    <CVE>CVE-2015-3814</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-3814.html</URL>
        <Description>CVE-2015-3814</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/930689</URL>
        <Description>SUSE Bug 930689</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/930691</URL>
        <Description>SUSE Bug 930691</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="187">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The detect_version function in wiretap/logcat.c in the Android Logcat file parser in Wireshark 1.12.x before 1.12.5 does not check the length of the payload, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a packet with a crafted payload, as demonstrated by a length of zero, a different vulnerability than CVE-2015-3906.</Note>
    </Notes>
    <CVE>CVE-2015-3815</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-3815.html</URL>
        <Description>CVE-2015-3815</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/930689</URL>
        <Description>SUSE Bug 930689</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="188">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The dissect_wccp2r1_address_table_info function in epan/dissectors/packet-wccp.c in the WCCP dissector in Wireshark 1.12.x before 1.12.6 does not properly determine whether enough memory is available for storing IP address strings, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.</Note>
    </Notes>
    <CVE>CVE-2015-4651</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-4651.html</URL>
        <Description>CVE-2015-4651</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/935157</URL>
        <Description>SUSE Bug 935157</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="189">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">epan/dissectors/packet-gsm_a_dtap.c in the GSM DTAP dissector in Wireshark 1.12.x before 1.12.6 does not properly validate digit characters, which allows remote attackers to cause a denial of service (application crash) via a crafted packet, related to the de_emerg_num_list and de_bcd_num functions.</Note>
    </Notes>
    <CVE>CVE-2015-4652</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-4652.html</URL>
        <Description>CVE-2015-4652</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/935158</URL>
        <Description>SUSE Bug 935158</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="190">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The proto_tree_add_bytes_item function in epan/proto.c in the protocol-tree implementation in Wireshark 1.12.x before 1.12.7 does not properly terminate a data structure after a failure to locate a number within a string, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.</Note>
    </Notes>
    <CVE>CVE-2015-6241</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-6241.html</URL>
        <Description>CVE-2015-6241</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/941500</URL>
        <Description>SUSE Bug 941500</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="191">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The wmem_block_split_free_chunk function in epan/wmem/wmem_allocator_block.c in the wmem block allocator in the memory manager in Wireshark 1.12.x before 1.12.7 does not properly consider a certain case of multiple realloc operations that restore a memory chunk to its original size, which allows remote attackers to cause a denial of service (incorrect free operation and application crash) via a crafted packet.</Note>
    </Notes>
    <CVE>CVE-2015-6242</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-6242.html</URL>
        <Description>CVE-2015-6242</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/941500</URL>
        <Description>SUSE Bug 941500</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="192">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The dissector-table implementation in epan/packet.c in Wireshark 1.12.x before 1.12.7 mishandles table searches for empty strings, which allows remote attackers to cause a denial of service (application crash) via a crafted packet, related to the (1) dissector_get_string_handle and (2) dissector_get_default_string_handle functions.</Note>
    </Notes>
    <CVE>CVE-2015-6243</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-6243.html</URL>
        <Description>CVE-2015-6243</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/941500</URL>
        <Description>SUSE Bug 941500</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="193">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The dissect_zbee_secure function in epan/dissectors/packet-zbee-security.c in the ZigBee dissector in Wireshark 1.12.x before 1.12.7 improperly relies on length fields contained in packet data, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.</Note>
    </Notes>
    <CVE>CVE-2015-6244</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-6244.html</URL>
        <Description>CVE-2015-6244</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/941500</URL>
        <Description>SUSE Bug 941500</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="194">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">epan/dissectors/packet-gsm_rlcmac.c in the GSM RLC/MAC dissector in Wireshark 1.12.x before 1.12.7 uses incorrect integer data types, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.</Note>
    </Notes>
    <CVE>CVE-2015-6245</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-6245.html</URL>
        <Description>CVE-2015-6245</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/941500</URL>
        <Description>SUSE Bug 941500</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="195">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The dissect_wa_payload function in epan/dissectors/packet-waveagent.c in the WaveAgent dissector in Wireshark 1.12.x before 1.12.7 mishandles large tag values, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.</Note>
    </Notes>
    <CVE>CVE-2015-6246</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-6246.html</URL>
        <Description>CVE-2015-6246</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/941500</URL>
        <Description>SUSE Bug 941500</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="196">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The dissect_openflow_tablemod_v5 function in epan/dissectors/packet-openflow_v5.c in the OpenFlow dissector in Wireshark 1.12.x before 1.12.7 does not validate a certain offset value, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.</Note>
    </Notes>
    <CVE>CVE-2015-6247</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-6247.html</URL>
        <Description>CVE-2015-6247</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/941500</URL>
        <Description>SUSE Bug 941500</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="197">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ptvcursor_add function in the ptvcursor implementation in epan/proto.c in Wireshark 1.12.x before 1.12.7 does not check whether the expected amount of data is available, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.</Note>
    </Notes>
    <CVE>CVE-2015-6248</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-6248.html</URL>
        <Description>CVE-2015-6248</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/941500</URL>
        <Description>SUSE Bug 941500</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="198">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The dissect_wccp2r1_address_table_info function in epan/dissectors/packet-wccp.c in the WCCP dissector in Wireshark 1.12.x before 1.12.7 does not prevent the conflicting use of a table for both IPv4 and IPv6 addresses, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.</Note>
    </Notes>
    <CVE>CVE-2015-6249</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-6249.html</URL>
        <Description>CVE-2015-6249</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/941500</URL>
        <Description>SUSE Bug 941500</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="199">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The pcapng_read_if_descr_block function in wiretap/pcapng.c in the pcapng parser in Wireshark 1.12.x before 1.12.8 uses too many levels of pointer indirection, which allows remote attackers to cause a denial of service (incorrect free and application crash) via a crafted packet that triggers interface-filter copying.</Note>
    </Notes>
    <CVE>CVE-2015-7830</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-7830.html</URL>
        <Description>CVE-2015-7830</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/950437</URL>
        <Description>SUSE Bug 950437</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/960382</URL>
        <Description>SUSE Bug 960382</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="200">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">epan/dissectors/packet-nbap.c in the NBAP dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate conversation data, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted packet.</Note>
    </Notes>
    <CVE>CVE-2015-8711</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8711.html</URL>
        <Description>CVE-2015-8711</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/960382</URL>
        <Description>SUSE Bug 960382</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="201">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Double free vulnerability in epan/dissectors/packet-nlm.c in the NLM dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1, when the "Match MSG/RES packets for async NLM" option is enabled, allows remote attackers to cause a denial of service (application crash) via a crafted packet.</Note>
    </Notes>
    <CVE>CVE-2015-8718</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8718.html</URL>
        <Description>CVE-2015-8718</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/960382</URL>
        <Description>SUSE Bug 960382</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="202">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The dissect_ber_GeneralizedTime function in epan/dissectors/packet-ber.c in the BER dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 improperly checks an sscanf return value, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.</Note>
    </Notes>
    <CVE>CVE-2015-8720</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8720.html</URL>
        <Description>CVE-2015-8720</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/960382</URL>
        <Description>SUSE Bug 960382</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="203">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Buffer overflow in the tvb_uncompress function in epan/tvbuff_zlib.c in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 allows remote attackers to cause a denial of service (application crash) via a crafted packet with zlib compression.</Note>
    </Notes>
    <CVE>CVE-2015-8721</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8721.html</URL>
        <Description>CVE-2015-8721</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/960382</URL>
        <Description>SUSE Bug 960382</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="204">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">epan/dissectors/packet-sctp.c in the SCTP dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the frame pointer, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted packet.</Note>
    </Notes>
    <CVE>CVE-2015-8722</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8722.html</URL>
        <Description>CVE-2015-8722</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/960382</URL>
        <Description>SUSE Bug 960382</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="205">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The AirPDcapPacketProcess function in epan/crypt/airpdcap.c in the 802.11 dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the relationship between the total length and the capture length, which allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) via a crafted packet.</Note>
    </Notes>
    <CVE>CVE-2015-8723</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8723.html</URL>
        <Description>CVE-2015-8723</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/960382</URL>
        <Description>SUSE Bug 960382</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="206">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The AirPDcapDecryptWPABroadcastKey function in epan/crypt/airpdcap.c in the 802.11 dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not verify the WPA broadcast key length, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet.</Note>
    </Notes>
    <CVE>CVE-2015-8724</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8724.html</URL>
        <Description>CVE-2015-8724</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/960382</URL>
        <Description>SUSE Bug 960382</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="207">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The dissect_diameter_base_framed_ipv6_prefix function in epan/dissectors/packet-diameter.c in the DIAMETER dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the IPv6 prefix length, which allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) via a crafted packet.</Note>
    </Notes>
    <CVE>CVE-2015-8725</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8725.html</URL>
        <Description>CVE-2015-8725</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/960382</URL>
        <Description>SUSE Bug 960382</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="208">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">wiretap/vwr.c in the VeriWave file parser in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate certain signature and Modulation and Coding Scheme (MCS) data, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted file.</Note>
    </Notes>
    <CVE>CVE-2015-8726</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8726.html</URL>
        <Description>CVE-2015-8726</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/960382</URL>
        <Description>SUSE Bug 960382</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="209">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The dissect_rsvp_common function in epan/dissectors/packet-rsvp.c in the RSVP dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not properly maintain request-key data, which allows remote attackers to cause a denial of service (use-after-free and application crash) via a crafted packet.</Note>
    </Notes>
    <CVE>CVE-2015-8727</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8727.html</URL>
        <Description>CVE-2015-8727</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/960382</URL>
        <Description>SUSE Bug 960382</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="210">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The Mobile Identity parser in (1) epan/dissectors/packet-ansi_a.c in the ANSI A dissector and (2) epan/dissectors/packet-gsm_a_common.c in the GSM A dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 improperly uses the tvb_bcd_dig_to_wmem_packet_str function, which allows remote attackers to cause a denial of service (buffer overflow and application crash) via a crafted packet.</Note>
    </Notes>
    <CVE>CVE-2015-8728</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8728.html</URL>
        <Description>CVE-2015-8728</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/960382</URL>
        <Description>SUSE Bug 960382</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="211">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ascend_seek function in wiretap/ascendtext.c in the Ascend file parser in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not ensure the presence of a '\0' character at the end of a date string, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted file.</Note>
    </Notes>
    <CVE>CVE-2015-8729</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8729.html</URL>
        <Description>CVE-2015-8729</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/960382</URL>
        <Description>SUSE Bug 960382</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="212">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">epan/dissectors/packet-nbap.c in the NBAP dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the number of items, which allows remote attackers to cause a denial of service (invalid read operation and application crash) via a crafted packet.</Note>
    </Notes>
    <CVE>CVE-2015-8730</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8730.html</URL>
        <Description>CVE-2015-8730</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/960382</URL>
        <Description>SUSE Bug 960382</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="213">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The dissct_rsl_ipaccess_msg function in epan/dissectors/packet-rsl.c in the RSL dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not reject unknown TLV types, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet.</Note>
    </Notes>
    <CVE>CVE-2015-8731</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8731.html</URL>
        <Description>CVE-2015-8731</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/960382</URL>
        <Description>SUSE Bug 960382</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="214">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The dissect_zcl_pwr_prof_pwrprofstatersp function in epan/dissectors/packet-zbee-zcl-general.c in the ZigBee ZCL dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the Total Profile Number field, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet.</Note>
    </Notes>
    <CVE>CVE-2015-8732</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8732.html</URL>
        <Description>CVE-2015-8732</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/960382</URL>
        <Description>SUSE Bug 960382</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="215">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ngsniffer_process_record function in wiretap/ngsniffer.c in the Sniffer file parser in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the relationships between record lengths and record header lengths, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted file.</Note>
    </Notes>
    <CVE>CVE-2015-8733</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8733.html</URL>
        <Description>CVE-2015-8733</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/960382</URL>
        <Description>SUSE Bug 960382</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="216">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The dissect_nwp function in epan/dissectors/packet-nwp.c in the NWP dissector in Wireshark 2.0.x before 2.0.1 mishandles the packet type, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.</Note>
    </Notes>
    <CVE>CVE-2015-8734</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8734.html</URL>
        <Description>CVE-2015-8734</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="217">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The get_value function in epan/dissectors/packet-btatt.c in the Bluetooth Attribute (aka BT ATT) dissector in Wireshark 2.0.x before 2.0.1 uses an incorrect integer data type, which allows remote attackers to cause a denial of service (invalid write operation and application crash) via a crafted packet.</Note>
    </Notes>
    <CVE>CVE-2015-8735</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8735.html</URL>
        <Description>CVE-2015-8735</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="218">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The mp2t_find_next_pcr function in wiretap/mp2t.c in the MP2T file parser in Wireshark 2.0.x before 2.0.1 does not reserve memory for a trailer, which allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) via a crafted file.</Note>
    </Notes>
    <CVE>CVE-2015-8736</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8736.html</URL>
        <Description>CVE-2015-8736</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="219">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The mp2t_open function in wiretap/mp2t.c in the MP2T file parser in Wireshark 2.0.x before 2.0.1 does not validate the bit rate, which allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted file.</Note>
    </Notes>
    <CVE>CVE-2015-8737</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8737.html</URL>
        <Description>CVE-2015-8737</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="220">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The s7comm_decode_ud_cpu_szl_subfunc function in epan/dissectors/packet-s7comm_szl_ids.c in the S7COMM dissector in Wireshark 2.0.x before 2.0.1 does not validate the list count in an SZL response, which allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted packet.</Note>
    </Notes>
    <CVE>CVE-2015-8738</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8738.html</URL>
        <Description>CVE-2015-8738</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="221">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ipmi_fmt_udpport function in epan/dissectors/packet-ipmi.c in the IPMI dissector in Wireshark 2.0.x before 2.0.1 improperly attempts to access a packet scope, which allows remote attackers to cause a denial of service (assertion failure and application exit) via a crafted packet.</Note>
    </Notes>
    <CVE>CVE-2015-8739</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8739.html</URL>
        <Description>CVE-2015-8739</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="222">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The dissect_tds7_colmetadata_token function in epan/dissectors/packet-tds.c in the TDS dissector in Wireshark 2.0.x before 2.0.1 does not validate the number of columns, which allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) via a crafted packet.</Note>
    </Notes>
    <CVE>CVE-2015-8740</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8740.html</URL>
        <Description>CVE-2015-8740</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="223">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The dissect_ppi function in epan/dissectors/packet-ppi.c in the PPI dissector in Wireshark 2.0.x before 2.0.1 does not initialize a packet-header data structure, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.</Note>
    </Notes>
    <CVE>CVE-2015-8741</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8741.html</URL>
        <Description>CVE-2015-8741</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="224">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The dissect_CPMSetBindings function in epan/dissectors/packet-mswsp.c in the MS-WSP dissector in Wireshark 2.0.x before 2.0.1 does not validate the column size, which allows remote attackers to cause a denial of service (memory consumption or application crash) via a crafted packet.</Note>
    </Notes>
    <CVE>CVE-2015-8742</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-8742.html</URL>
        <Description>CVE-2015-8742</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="225">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The dissect_ber_constrained_bitstring function in epan/dissectors/packet-ber.c in the ASN.1 BER dissector in Wireshark 2.0.x before 2.0.2 does not verify that a certain length is nonzero, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet.</Note>
    </Notes>
    <CVE>CVE-2016-2522</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-2522.html</URL>
        <Description>CVE-2016-2522</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/968565</URL>
        <Description>SUSE Bug 968565</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="226">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The dnp3_al_process_object function in epan/dissectors/packet-dnp.c in the DNP3 dissector in Wireshark 1.12.x before 1.12.10 and 2.0.x before 2.0.2 allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.</Note>
    </Notes>
    <CVE>CVE-2016-2523</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.1</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-2523.html</URL>
        <Description>CVE-2016-2523</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/968565</URL>
        <Description>SUSE Bug 968565</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="227">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">epan/dissectors/packet-x509af.c in the X.509AF dissector in Wireshark 2.0.x before 2.0.2 mishandles the algorithm ID, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.</Note>
    </Notes>
    <CVE>CVE-2016-2524</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-2524.html</URL>
        <Description>CVE-2016-2524</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/968565</URL>
        <Description>SUSE Bug 968565</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="228">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">epan/dissectors/packet-http2.c in the HTTP/2 dissector in Wireshark 2.0.x before 2.0.2 does not limit the amount of header data, which allows remote attackers to cause a denial of service (memory consumption or application crash) via a crafted packet.</Note>
    </Notes>
    <CVE>CVE-2016-2525</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-2525.html</URL>
        <Description>CVE-2016-2525</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/968565</URL>
        <Description>SUSE Bug 968565</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="229">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">epan/dissectors/packet-hiqnet.c in the HiQnet dissector in Wireshark 2.0.x before 2.0.2 does not validate the data type, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet.</Note>
    </Notes>
    <CVE>CVE-2016-2526</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-2526.html</URL>
        <Description>CVE-2016-2526</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/968565</URL>
        <Description>SUSE Bug 968565</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="230">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">wiretap/nettrace_3gpp_32_423.c in the 3GPP TS 32.423 Trace file parser in Wireshark 2.0.x before 2.0.2 does not ensure that a '\0' character is present at the end of certain strings, which allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) via a crafted file.</Note>
    </Notes>
    <CVE>CVE-2016-2527</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-2527.html</URL>
        <Description>CVE-2016-2527</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/968565</URL>
        <Description>SUSE Bug 968565</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="231">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The dissect_nhdr_extopt function in epan/dissectors/packet-lbmc.c in the LBMC dissector in Wireshark 2.0.x before 2.0.2 does not validate length values, which allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) via a crafted packet.</Note>
    </Notes>
    <CVE>CVE-2016-2528</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-2528.html</URL>
        <Description>CVE-2016-2528</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/968565</URL>
        <Description>SUSE Bug 968565</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="232">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The iseries_check_file_type function in wiretap/iseries.c in the iSeries file parser in Wireshark 2.0.x before 2.0.2 does not consider that a line may lack the "OBJECT PROTOCOL" substring, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted file.</Note>
    </Notes>
    <CVE>CVE-2016-2529</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-2529.html</URL>
        <Description>CVE-2016-2529</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/968565</URL>
        <Description>SUSE Bug 968565</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="233">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The dissct_rsl_ipaccess_msg function in epan/dissectors/packet-rsl.c in the RSL dissector in Wireshark 1.12.x before 1.12.10 and 2.0.x before 2.0.2 mishandles the case of an unrecognized TLV type, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet, a different vulnerability than CVE-2016-2531.</Note>
    </Notes>
    <CVE>CVE-2016-2530</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-2530.html</URL>
        <Description>CVE-2016-2530</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/968565</URL>
        <Description>SUSE Bug 968565</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="234">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Off-by-one error in epan/dissectors/packet-rsl.c in the RSL dissector in Wireshark 1.12.x before 1.12.10 and 2.0.x before 2.0.2 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet that triggers a 0xff tag value, a different vulnerability than CVE-2016-2530.</Note>
    </Notes>
    <CVE>CVE-2016-2531</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-2531.html</URL>
        <Description>CVE-2016-2531</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/968565</URL>
        <Description>SUSE Bug 968565</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="235">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The dissect_llrp_parameters function in epan/dissectors/packet-llrp.c in the LLRP dissector in Wireshark 1.12.x before 1.12.10 and 2.0.x before 2.0.2 does not limit the recursion depth, which allows remote attackers to cause a denial of service (memory consumption or application crash) via a crafted packet.</Note>
    </Notes>
    <CVE>CVE-2016-2532</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-2532.html</URL>
        <Description>CVE-2016-2532</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/968565</URL>
        <Description>SUSE Bug 968565</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="236">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">epan/dissectors/packet-dcerpc-spoolss.c in the SPOOLS component in Wireshark 1.12.x before 1.12.12 and 2.x before 2.0.4 mishandles unexpected offsets, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.</Note>
    </Notes>
    <CVE>CVE-2016-5350</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5350.html</URL>
        <Description>CVE-2016-5350</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/983671</URL>
        <Description>SUSE Bug 983671</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="237">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">epan/crypt/airpdcap.c in the IEEE 802.11 dissector in Wireshark 1.12.x before 1.12.12 and 2.x before 2.0.4 mishandles the lack of an EAPOL_RSN_KEY, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.</Note>
    </Notes>
    <CVE>CVE-2016-5351</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5351.html</URL>
        <Description>CVE-2016-5351</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/983671</URL>
        <Description>SUSE Bug 983671</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="238">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">epan/crypt/airpdcap.c in the IEEE 802.11 dissector in Wireshark 2.x before 2.0.4 mishandles certain length values, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.</Note>
    </Notes>
    <CVE>CVE-2016-5352</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5352.html</URL>
        <Description>CVE-2016-5352</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/983671</URL>
        <Description>SUSE Bug 983671</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="239">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">epan/dissectors/packet-umts_fp.c in the UMTS FP dissector in Wireshark 1.12.x before 1.12.12 and 2.x before 2.0.4 mishandles the reserved C/T value, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.</Note>
    </Notes>
    <CVE>CVE-2016-5353</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5353.html</URL>
        <Description>CVE-2016-5353</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/983671</URL>
        <Description>SUSE Bug 983671</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="240">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The USB subsystem in Wireshark 1.12.x before 1.12.12 and 2.x before 2.0.4 mishandles class types, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.</Note>
    </Notes>
    <CVE>CVE-2016-5354</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5354.html</URL>
        <Description>CVE-2016-5354</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/983671</URL>
        <Description>SUSE Bug 983671</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="241">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">wiretap/toshiba.c in the Toshiba file parser in Wireshark 1.12.x before 1.12.12 and 2.x before 2.0.4 mishandles sscanf unsigned-integer processing, which allows remote attackers to cause a denial of service (application crash) via a crafted file.</Note>
    </Notes>
    <CVE>CVE-2016-5355</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5355.html</URL>
        <Description>CVE-2016-5355</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/983671</URL>
        <Description>SUSE Bug 983671</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="242">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">wiretap/cosine.c in the CoSine file parser in Wireshark 1.12.x before 1.12.12 and 2.x before 2.0.4 mishandles sscanf unsigned-integer processing, which allows remote attackers to cause a denial of service (application crash) via a crafted file.</Note>
    </Notes>
    <CVE>CVE-2016-5356</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5356.html</URL>
        <Description>CVE-2016-5356</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/983671</URL>
        <Description>SUSE Bug 983671</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="243">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">wiretap/netscreen.c in the NetScreen file parser in Wireshark 1.12.x before 1.12.12 and 2.x before 2.0.4 mishandles sscanf unsigned-integer processing, which allows remote attackers to cause a denial of service (application crash) via a crafted file.</Note>
    </Notes>
    <CVE>CVE-2016-5357</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5357.html</URL>
        <Description>CVE-2016-5357</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/983671</URL>
        <Description>SUSE Bug 983671</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="244">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">epan/dissectors/packet-pktap.c in the Ethernet dissector in Wireshark 2.x before 2.0.4 mishandles the packet-header data type, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.</Note>
    </Notes>
    <CVE>CVE-2016-5358</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5358.html</URL>
        <Description>CVE-2016-5358</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/983671</URL>
        <Description>SUSE Bug 983671</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="245">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">epan/dissectors/packet-packetbb.c in the PacketBB dissector in Wireshark 1.12.x before 1.12.13 and 2.x before 2.0.5 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted packet.</Note>
    </Notes>
    <CVE>CVE-2016-6505</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-6505.html</URL>
        <Description>CVE-2016-6505</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/991013</URL>
        <Description>SUSE Bug 991013</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="246">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">epan/dissectors/packet-rlc.c in the RLC dissector in Wireshark 1.12.x before 1.12.13 and 2.x before 2.0.5 uses an incorrect integer data type, which allows remote attackers to cause a denial of service (large loop) via a crafted packet.</Note>
    </Notes>
    <CVE>CVE-2016-6508</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-6508.html</URL>
        <Description>CVE-2016-6508</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/991017</URL>
        <Description>SUSE Bug 991017</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="247">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">epan/dissectors/packet-ldss.c in the LDSS dissector in Wireshark 1.12.x before 1.12.13 and 2.x before 2.0.5 mishandles conversations, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.</Note>
    </Notes>
    <CVE>CVE-2016-6509</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-6509.html</URL>
        <Description>CVE-2016-6509</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/991018</URL>
        <Description>SUSE Bug 991018</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="248">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Off-by-one error in epan/dissectors/packet-rlc.c in the RLC dissector in Wireshark 1.12.x before 1.12.13 and 2.x before 2.0.5 allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) via a crafted packet.</Note>
    </Notes>
    <CVE>CVE-2016-6510</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-6510.html</URL>
        <Description>CVE-2016-6510</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/991019</URL>
        <Description>SUSE Bug 991019</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="249">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">epan/proto.c in Wireshark 1.12.x before 1.12.13 and 2.x before 2.0.5 allows remote attackers to cause a denial of service (OpenFlow dissector large loop) via a crafted packet.</Note>
    </Notes>
    <CVE>CVE-2016-6511</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-6511.html</URL>
        <Description>CVE-2016-6511</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/991020</URL>
        <Description>SUSE Bug 991020</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="250">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">epan/dissectors/packet-wap.c in Wireshark 2.x before 2.0.5 omits an overflow check in the tvb_get_guintvar function, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet, related to the MMSE, WAP, WBXML, and WSP dissectors.</Note>
    </Notes>
    <CVE>CVE-2016-6512</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-6512.html</URL>
        <Description>CVE-2016-6512</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/991021</URL>
        <Description>SUSE Bug 991021</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="251">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">epan/dissectors/packet-wbxml.c in the WBXML dissector in Wireshark 2.x before 2.0.5 does not restrict the recursion depth, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.</Note>
    </Notes>
    <CVE>CVE-2016-6513</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-6513.html</URL>
        <Description>CVE-2016-6513</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/991022</URL>
        <Description>SUSE Bug 991022</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="252">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">epan/dissectors/packet-qnet6.c in the QNX6 QNET dissector in Wireshark 2.x before 2.0.6 mishandles MAC address data, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet.</Note>
    </Notes>
    <CVE>CVE-2016-7175</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.1</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7175.html</URL>
        <Description>CVE-2016-7175</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/998099</URL>
        <Description>SUSE Bug 998099</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/998761</URL>
        <Description>SUSE Bug 998761</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="253">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">epan/dissectors/packet-h225.c in the H.225 dissector in Wireshark 2.x before 2.0.6 calls snprintf with one of its input buffers as the output buffer, which allows remote attackers to cause a denial of service (copy overlap and application crash) via a crafted packet.</Note>
    </Notes>
    <CVE>CVE-2016-7176</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.1</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7176.html</URL>
        <Description>CVE-2016-7176</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/998099</URL>
        <Description>SUSE Bug 998099</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/998762</URL>
        <Description>SUSE Bug 998762</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="254">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">epan/dissectors/packet-catapult-dct2000.c in the Catapult DCT2000 dissector in Wireshark 2.x before 2.0.6 does not restrict the number of channels, which allows remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted packet.</Note>
    </Notes>
    <CVE>CVE-2016-7177</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.1</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7177.html</URL>
        <Description>CVE-2016-7177</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/998099</URL>
        <Description>SUSE Bug 998099</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/998763</URL>
        <Description>SUSE Bug 998763</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="255">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">epan/dissectors/packet-umts_fp.c in the UMTS FP dissector in Wireshark 2.x before 2.0.6 does not ensure that memory is allocated for certain data structures, which allows remote attackers to cause a denial of service (invalid write access and application crash) via a crafted packet.</Note>
    </Notes>
    <CVE>CVE-2016-7178</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.1</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7178.html</URL>
        <Description>CVE-2016-7178</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/998099</URL>
        <Description>SUSE Bug 998099</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/998964</URL>
        <Description>SUSE Bug 998964</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="256">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Stack-based buffer overflow in epan/dissectors/packet-catapult-dct2000.c in the Catapult DCT2000 dissector in Wireshark 2.x before 2.0.6 allows remote attackers to cause a denial of service (application crash) via a crafted packet.</Note>
    </Notes>
    <CVE>CVE-2016-7179</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.1</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7179.html</URL>
        <Description>CVE-2016-7179</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/998099</URL>
        <Description>SUSE Bug 998099</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/998963</URL>
        <Description>SUSE Bug 998963</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="257">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">epan/dissectors/packet-ipmi-trace.c in the IPMI trace dissector in Wireshark 2.x before 2.0.6 does not properly consider whether a string is constant, which allows remote attackers to cause a denial of service (use-after-free and application crash) via a crafted packet.</Note>
    </Notes>
    <CVE>CVE-2016-7180</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.1</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7180.html</URL>
        <Description>CVE-2016-7180</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/998099</URL>
        <Description>SUSE Bug 998099</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/998800</URL>
        <Description>SUSE Bug 998800</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="258">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.2.0 to 2.2.1, the Profinet I/O dissector could loop excessively, triggered by network traffic or a capture file. This was addressed in plugins/profinet/packet-pn-rtc-one.c by rejecting input with too many I/O objects.</Note>
    </Notes>
    <CVE>CVE-2016-9372</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9372.html</URL>
        <Description>CVE-2016-9372</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1010807</URL>
        <Description>SUSE Bug 1010807</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="259">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.2.0 to 2.2.1 and 2.0.0 to 2.0.7, the DCERPC dissector could crash with a use-after-free, triggered by network traffic or a capture file. This was addressed in epan/dissectors/packet-dcerpc-nt.c and epan/dissectors/packet-dcerpc-spoolss.c by using the wmem file scope for private strings.</Note>
    </Notes>
    <CVE>CVE-2016-9373</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.1</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9373.html</URL>
        <Description>CVE-2016-9373</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1010754</URL>
        <Description>SUSE Bug 1010754</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1010911</URL>
        <Description>SUSE Bug 1010911</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="260">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.2.0 to 2.2.1 and 2.0.0 to 2.0.7, the AllJoyn dissector could crash with a buffer over-read, triggered by network traffic or a capture file. This was addressed in epan/dissectors/packet-alljoyn.c by ensuring that a length variable properly tracked the state of a signature variable.</Note>
    </Notes>
    <CVE>CVE-2016-9374</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.1</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9374.html</URL>
        <Description>CVE-2016-9374</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1010752</URL>
        <Description>SUSE Bug 1010752</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1010911</URL>
        <Description>SUSE Bug 1010911</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="261">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.2.0 to 2.2.1 and 2.0.0 to 2.0.7, the DTN dissector could go into an infinite loop, triggered by network traffic or a capture file. This was addressed in epan/dissectors/packet-dtn.c by checking whether SDNV evaluation was successful.</Note>
    </Notes>
    <CVE>CVE-2016-9375</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.1</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9375.html</URL>
        <Description>CVE-2016-9375</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1010740</URL>
        <Description>SUSE Bug 1010740</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1010911</URL>
        <Description>SUSE Bug 1010911</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="262">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Wireshark 2.2.0 to 2.2.1 and 2.0.0 to 2.0.7, the OpenFlow dissector could crash with memory exhaustion, triggered by network traffic or a capture file. This was addressed in epan/dissectors/packet-openflow_v5.c by ensuring that certain length values were sufficiently large.</Note>
    </Notes>
    <CVE>CVE-2016-9376</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:wireshark-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-devel-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-gtk-2.2.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:wireshark-ui-qt-2.2.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.1</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9376.html</URL>
        <Description>CVE-2016-9376</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1010735</URL>
        <Description>SUSE Bug 1010735</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1010911</URL>
        <Description>SUSE Bug 1010911</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
