First published: Thu Aug 16 2012(Updated: )
Integer signedness error in the vwr_read_rec_data_ethernet function in wiretap/vwr.c in the Ixia IxVeriWave file parser in Wireshark 1.8.x before 1.8.2 allows user-assisted remote attackers to execute arbitrary code via a crafted packet-trace file that triggers a buffer overflow.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Sun SunOS | =5.11 | |
Wireshark Wireshark | =1.8.0 | |
Wireshark Wireshark | =1.8.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-4298 has a high severity rating due to its potential to allow remote attackers to execute arbitrary code.
To fix CVE-2012-4298, update Wireshark to version 1.8.2 or later.
CVE-2012-4298 affects Wireshark versions 1.8.0 and 1.8.1.
CVE-2012-4298 can be exploited by remote attackers using a crafted packet-trace file.
Yes, CVE-2012-4298 is specifically related to a buffer overflow caused by an integer signedness error.