First published: Thu Jun 02 2011(Updated: )
An integer underflow flaw, leading to heap-based buffer over-read was found in the Wireshark's Visual Networks dissector. A remote attacker could create a specially-crafted capture file, which once opened, by a local, unsuspecting user could lead to wireshark application crash. References: [1] <a href="https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5934">https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5934</a> (upstream bug report) [2] <a href="https://bugs.wireshark.org/bugzilla/attachment.cgi?id=6366">https://bugs.wireshark.org/bugzilla/attachment.cgi?id=6366</a> (reproducer) [3] <a href="http://www.openwall.com/lists/oss-security/2011/05/31/20">http://www.openwall.com/lists/oss-security/2011/05/31/20</a> (CVE request) [4] <a href="http://www.wireshark.org/security/wnpa-sec-2011-07.html">http://www.wireshark.org/security/wnpa-sec-2011-07.html</a> (upstream advisory) Upstream patch: [5] <a href="http://anonsvn.wireshark.org/viewvc?view=revision&amp;revision=37128">http://anonsvn.wireshark.org/viewvc?view=revision&amp;revision=37128</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Wireshark Wireshark | =1.2.7 | |
Wireshark Wireshark | =1.2.11 | |
Wireshark Wireshark | =1.2.10 | |
Wireshark Wireshark | =1.2.6 | |
Wireshark Wireshark | =1.2.8 | |
Wireshark Wireshark | =1.2.0 | |
Wireshark Wireshark | =1.2.15 | |
Wireshark Wireshark | =1.2.14 | |
Wireshark Wireshark | =1.2.3 | |
Wireshark Wireshark | =1.2.12 | |
Wireshark Wireshark | =1.2.13 | |
Wireshark Wireshark | =1.2.5 | |
Wireshark Wireshark | =1.2.1 | |
Wireshark Wireshark | =1.2.4 | |
Wireshark Wireshark | =1.2 | |
Wireshark Wireshark | =1.2.9 | |
Wireshark Wireshark | =1.2.2 | |
Wireshark Wireshark | =1.2.16 | |
Wireshark Wireshark | =1.4.2 | |
Wireshark Wireshark | =1.4.0 | |
Wireshark Wireshark | =1.4.5 | |
Wireshark Wireshark | =1.4.4 | |
Wireshark Wireshark | =1.4.6 | |
Wireshark Wireshark | =1.4.3 | |
Wireshark Wireshark | =1.4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.