First published: Wed Dec 05 2012(Updated: )
The dissect_wtp_common function in epan/dissectors/packet-wtp.c in the WTP dissector in Wireshark 1.6.x before 1.6.12 and 1.8.x before 1.8.4 uses an incorrect data type for a certain length field, which allows remote attackers to cause a denial of service (integer overflow and infinite loop) via a crafted value in a packet.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Wireshark Wireshark | =1.6.0 | |
Wireshark Wireshark | =1.6.1 | |
Wireshark Wireshark | =1.6.2 | |
Wireshark Wireshark | =1.6.3 | |
Wireshark Wireshark | =1.6.4 | |
Wireshark Wireshark | =1.6.5 | |
Wireshark Wireshark | =1.6.6 | |
Wireshark Wireshark | =1.6.7 | |
Wireshark Wireshark | =1.6.8 | |
Wireshark Wireshark | =1.6.9 | |
Wireshark Wireshark | =1.6.10 | |
Wireshark Wireshark | =1.6.11 | |
Wireshark Wireshark | =1.8.0 | |
Wireshark Wireshark | =1.8.1 | |
Wireshark Wireshark | =1.8.2 | |
Wireshark Wireshark | =1.8.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2012-6061 is categorized as moderate due to its potential to cause a denial of service through an integer overflow.
To fix CVE-2012-6061, upgrade to Wireshark version 1.6.12 or later for the 1.6.x series and version 1.8.4 or later for the 1.8.x series.
Wireshark versions 1.6.0 through 1.6.11 and 1.8.0 through 1.8.3 are affected by CVE-2012-6061.
CVE-2012-6061 is a denial of service vulnerability caused by an incorrect data type in the WTP dissector.
Yes, CVE-2012-6061 can be exploited remotely, allowing attackers to create conditions that lead to a denial of service.