First published: Fri Jan 07 2011(Updated: )
Buffer overflow in the sect_enttec_dmx_da function in epan/dissectors/packet-enttec.c in Wireshark 1.4.2 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted ENTTEC DMX packet with Run Length Encoding (RLE) compression.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Wireshark Wireshark | =1.4.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-4538 has a high severity rating due to potential exploitation leading to application crashes or arbitrary code execution.
To fix CVE-2010-4538, upgrade to a version of Wireshark later than 1.4.2 that has addressed this vulnerability.
CVE-2010-4538 facilitates denial of service attacks and potentially allows for remote code execution.
Wireshark version 1.4.2 is specifically affected by CVE-2010-4538.
An attacker can exploit CVE-2010-4538 by sending a crafted ENTTEC DMX packet with Run Length Encoding (RLE) compression to the target Wireshark application.