First published: Thu Jun 02 2011(Updated: )
A NULL pointer dereference flaw was found in the way Wireshark processed certain Diameter dictionary files. A remote attacker could create a specially-crafted dictionary file, which once used, by a local, unsuspecting user when loading a Diameter capture file could lead to wireshark application crash. References: [1] <a href="http://www.openwall.com/lists/oss-security/2011/05/31/20">http://www.openwall.com/lists/oss-security/2011/05/31/20</a> (CVE request) [2] <a href="http://www.wireshark.org/security/wnpa-sec-2011-07.html">http://www.wireshark.org/security/wnpa-sec-2011-07.html</a> (upstream advisory)
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Wireshark Wireshark | =1.2.7 | |
Wireshark Wireshark | =1.2.11 | |
Wireshark Wireshark | =1.2.10 | |
Wireshark Wireshark | =1.2.6 | |
Wireshark Wireshark | =1.2.8 | |
Wireshark Wireshark | =1.2.0 | |
Wireshark Wireshark | =1.2.15 | |
Wireshark Wireshark | =1.2.14 | |
Wireshark Wireshark | =1.2.3 | |
Wireshark Wireshark | =1.2.12 | |
Wireshark Wireshark | =1.2.13 | |
Wireshark Wireshark | =1.2.5 | |
Wireshark Wireshark | =1.2.1 | |
Wireshark Wireshark | =1.2.4 | |
Wireshark Wireshark | =1.2 | |
Wireshark Wireshark | =1.2.9 | |
Wireshark Wireshark | =1.2.2 | |
Wireshark Wireshark | =1.2.16 | |
Wireshark Wireshark | =1.4.2 | |
Wireshark Wireshark | =1.4.0 | |
Wireshark Wireshark | =1.4.5 | |
Wireshark Wireshark | =1.4.4 | |
Wireshark Wireshark | =1.4.6 | |
Wireshark Wireshark | =1.4.3 | |
Wireshark Wireshark | =1.4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.