Summary
This host is installed with Wireshark and is prone to denial of service vulnerability.
Impact
Successful exploitation will allow remote attackers to cause a denial of service condition.
Impact Level: Application
Solution
Upgrade to the Wireshark version 1.4.7 or later,
For updates refer to http://www.wireshark.org/download
Insight
The flaw is caused by an error in the 'bytes_repr_len' function, which allows remote attackers to cause a denial of service via arbitrary TCP traffic.
Affected
Wireshark version 1.4.5
References
Severity
Classification
-
CVE CVE-2011-1956 -
CVSS Base Score: 4.3
AV:N/AC:M/Au:N/C:N/I:N/A:P
Related Vulnerabilities
- FreeSWITCH 'switch_regex.c' Multiple Buffer Overflow Vulnerabilities
- Comodo Internet Security Denial of Service Vulnerability July 13
- Apache Subversion 'mod_dav_svn' log REPORT Request DoS Vulnerability
- Apache APR-util 'buckets/apr_brigade.c' Denial Of Service Vulnerability
- at32 Reverse Proxy Multiple HTTP Header Fields Denial Of Service Vulnerability