First published: Thu Jul 10 2008(Updated: )
The fragment_add_work function in epan/reassemble.c in Wireshark 0.8.19 through 1.0.1 allows remote attackers to cause a denial of service (crash) via a series of fragmented packets with non-sequential fragmentation offset values, which lead to a buffer over-read.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Wireshark Wireshark | =0.99.8 | |
Wireshark Wireshark | =0.99.3 | |
Wireshark Wireshark | =0.99.0 | |
Wireshark Wireshark | =1.0.1 | |
Wireshark Wireshark | =0.8.19 | |
Wireshark Wireshark | =1.0 | |
Wireshark Wireshark | =0.99.6 | |
Wireshark Wireshark | =0.99.2 | |
Wireshark Wireshark | =0.99.1 | |
Wireshark Wireshark | =0.99.5 | |
Wireshark Wireshark | =0.99.4 | |
Wireshark Wireshark | =1.0.0 | |
Wireshark Wireshark | =0.99.6a | |
Wireshark Wireshark | =0.99.7 | |
redhat/wireshark | <0:1.0.3-3.el4_7 | 0:1.0.3-3.el4_7 |
redhat/wireshark | <0:1.0.3-4.el5_2 | 0:1.0.3-4.el5_2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.