First published: Wed Aug 24 2011(Updated: )
The proto_tree_add_item function in Wireshark 1.6.0 through 1.6.1 and 1.4.0 through 1.4.8, when the IKEv1 protocol dissector is used, allows user-assisted remote attackers to cause a denial of service (infinite loop) via vectors involving a malformed IKE packet and many items in a tree.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Wireshark Wireshark | =1.6.0 | |
Wireshark Wireshark | =1.6.1 | |
Wireshark Wireshark | =1.4.7 | |
Wireshark Wireshark | =1.4.2 | |
Wireshark Wireshark | =1.4.0 | |
Wireshark Wireshark | =1.4.5 | |
Wireshark Wireshark | =1.4.4 | |
Wireshark Wireshark | =1.4.6 | |
Wireshark Wireshark | =1.4.3 | |
Wireshark Wireshark | =1.4.1 | |
Wireshark Wireshark | =1.4.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-3266 has a severity rating that indicates it can cause a denial of service due to an infinite loop.
To fix CVE-2011-3266, you should upgrade to a version of Wireshark that is not affected, such as Wireshark 1.6.2 or later.
CVE-2011-3266 affects Wireshark versions 1.6.0 through 1.6.1 and 1.4.0 through 1.4.8.
CVE-2011-3266 involves a user-assisted remote attacker exploiting a malformed IKE packet.
No, CVE-2011-3266 requires user-assisted action to exploit the vulnerability.