Summary
This host is installed with Wireshark and is prone to multiple denial of service vulnerabilities.
Impact
Successful exploitation will allow remote attackers to cause a denial of service.
Impact Level: Application
Solution
Upgrade to the Wireshark version 1.4.12, 1.6.6 or later, For updates refer to http://www.wireshark.org/download
Insight
The flaws are due to
- A NULL pointer dereference error in the ANSI A dissector can be exploited to cause a crash via a specially crafted packet.
- An error in the MP2T dissector when allocating memory can be exploited to cause a crash via a specially crafted packet.
- An error exists in the pcap and pcap-ng file parsers when reading ERF data and can cause a crash via a specially crafted trace file.
Affected
Wireshark versions 1.4.x before 1.4.12 and 1.6.x before 1.6.6 on Windows
References
- http://anonsvn.wireshark.org/viewvc?view=revision&revision=41001
- http://www.openwall.com/lists/oss-security/2012/03/28/13
- http://www.wireshark.org/security/wnpa-sec-2012-04.html
- http://www.wireshark.org/security/wnpa-sec-2012-06.html
- http://www.wireshark.org/security/wnpa-sec-2012-07.html
Updated on 2015-03-25
Severity
Classification
-
CVE CVE-2012-1593, CVE-2012-1595, CVE-2012-1596 -
CVSS Base Score: 5.0
AV:N/AC:L/Au:N/C:N/I:N/A:P
Related Vulnerabilities