|
|
| |
| Wireshark is prone to a buffer-underflow vulnerability and multiple denial-of-service vulnerabilities. |
| |
Credit:
The information has been provided by Laurent Butti.
The original article can be found at: http://www.securityfocus.com/bid/51710
|
| |
Vulnerable Systems:
* Wireshark Wireshark 1.6.4
* Wireshark Wireshark 1.6.3
* Wireshark Wireshark 1.6.2
* Wireshark Wireshark 1.6.1
* Wireshark Wireshark 1.6
* Wireshark Wireshark 1.4.10
* Wireshark Wireshark 1.4.9
* Wireshark Wireshark 1.4.8
* Wireshark Wireshark 1.4.7
* Wireshark Wireshark 1.4.6
* Wireshark Wireshark 1.4.5
* Wireshark Wireshark 1.4.4
* Wireshark Wireshark 1.4.3
* Wireshark Wireshark 1.4.2
* Wireshark Wireshark 1.4.1
* Wireshark Wireshark 1.4.1
* Wireshark Wireshark 1.4.0
Immune Systems:
* Wireshark Wireshark 1.6.5
* Wireshark Wireshark 1.4.11
Remote attackers can exploit these issues to execute arbitrary code in the context of the application or cause denial-of-service conditions.
Vendor Status:
Wireshark had issued an update for this vulnerability
Patch Availability:
http://www.wireshark.org/download.html
CVE Information:
CVE-2012-0068
Disclosure Timeline:
Initial Release: Jan 10 2012
|
|
blog comments powered by
|