Wireshark is prone to a buffer-overflow vulnerability.
Credit:
The information has been provided by gerald .
The original article can be found at: http://www.securityfocus.com/bid/46416
Vulnerable Systems:
* Wireshark Wireshark 1.4.3
* Wireshark Wireshark 1.4.2
* Wireshark Wireshark 1.4.1
* Wireshark Wireshark 1.2.12
* Wireshark Wireshark 1.2.10
* Wireshark Wireshark 1.2.10
* Wireshark Wireshark 1.2.9
* Wireshark Wireshark 1.2.8
* Wireshark Wireshark 1.2.7
* Wireshark Wireshark 1.2.6
* Wireshark Wireshark 1.2.5
* Wireshark Wireshark 1.2.4
* Wireshark Wireshark 1.2.3
* Wireshark Wireshark 1.2.2
* Wireshark Wireshark 1.2.1
* Wireshark Wireshark 1.2
* Wireshark Wireshark 1.4.1
* Wireshark Wireshark 1.4.0
* Wireshark Wireshark 1.2.14
* Wireshark Wireshark 1.2.13
* Wireshark Wireshark 1.2.12
* Wireshark Wireshark 1.2.11
Non Vulnerable Systems:
* Wireshark Wireshark 1.4.4
* Wireshark Wireshark 1.2.15
Exploiting this issue may allow attackers to crash the application and deny service to legitimate users. Attackers may also execute arbitrary code in the context of vulnerable users running the application.
Vendor Status:
Wireshark had issued an update for this vulnerability
Patch Availability:
http://www.wireshark.org/download.html
CVE Information:
CVE-2011-0713
Disclosure Timeline:
Initial Release: Feb 16 2011
Please enable JavaScript to view the comments powered by Disqus.
blog comments powered by