SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   Wireshark Vendors:   Wireshark.org
Wireshark Packet Capture File Bugs Let Remote Users Deny Service
SecurityTracker Alert ID:  1026506
SecurityTracker URL:  http://securitytracker.com/id/1026506
CVE Reference:   CVE-2012-0041, CVE-2012-0066, CVE-2012-0067, CVE-2012-0068   (Links to External Site)
Updated:  Jan 27 2012
Original Entry Date:  Jan 11 2012
Impact:   Denial of service via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 1.4.0 to 1.4.10, 1.6.0 to 1.6.4
Description:   A vulnerability was reported in Wireshark. A remote user can cause denial of service conditions.

The software does not properly check record sizes for several packet capture file formats. A remote user can create a specially crafted packet trace file that, when loaded by the target user, will cause Wireshark to crash.

The iptrace, 5Views, i4b, and netmon file formats are affected.

Laurent Butti reported this vulnerability.

Impact:   A remote user can cause Wireshark to crash.
Solution:   The vendor has issued a fix (1.4.11, 1.6.5).

The vendor's advisory is available at:

http://www.wireshark.org/security/wnpa-sec-2012-01.html

Vendor URL:  www.wireshark.org/security/wnpa-sec-2012-01.html (Links to External Site)
Cause:   Input validation error
Underlying OS:  Linux (Any), UNIX (Any), Windows (Any)

Message History:   This archive entry has one or more follow-up message(s) listed below.
Apr 24 2012 (Red Hat Issues Fix) Wireshark Packet Capture File Bugs Let Remote Users Deny Service
Red Hat has issued a fix for Red Hat Enterprise Linux 6.



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2020, SecurityGlobal.net LLC