First published: Tue Nov 01 2011(Updated: )
An uninitialized variable in the CSN.1 dissector in Wireshark 1.6.0 through 1.6.2 could cause Wireshark to crash by reading a malformed packet trace file or if someone were to inject a malformed packet onto the the wire. This is corrected in wireshark 1.6.3. References: <a href="https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6351">https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6351</a> <a href="http://anonsvn.wireshark.org/viewvc?view=revision&revision=39140">http://anonsvn.wireshark.org/viewvc?view=revision&revision=39140</a> External References: <a href="http://www.wireshark.org/security/wnpa-sec-2011-17.html">http://www.wireshark.org/security/wnpa-sec-2011-17.html</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Wireshark Wireshark | =1.6.0 | |
Wireshark Wireshark | =1.6.1 | |
Wireshark Wireshark | =1.6.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-4100 has been classified as a high severity vulnerability due to its potential to crash Wireshark with malformed packets.
To fix CVE-2011-4100, upgrade Wireshark to version 1.6.3 or later.
Wireshark versions 1.6.0, 1.6.1, and 1.6.2 are affected by CVE-2011-4100.
Exploiting CVE-2011-4100 can lead to a crash of the Wireshark application when processing malformed packet trace files.
Yes, CVE-2011-4100 poses a risk to network security by potentially allowing an attacker to disrupt Wireshark's functionality.