Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2013-1585

Опубликовано: 03 фев. 2013
Источник: debian

Описание

epan/tvbuff.c in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly validate certain length values for the MS-MMC dissector, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
wiresharkfixed1.8.6-1package
wiresharknot-affectedsqueezepackage
wiresharkfixed1.8.2-5wheezy1wheezypackage

Примечания

  • Upstream bug: https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8112

  • http://anonsvn.wireshark.org/viewvc?view=revision&revision=46705

  • http://anonsvn.wireshark.org/viewvc?view=revision&revision=46678

Связанные уязвимости

ubuntu
около 13 лет назад

epan/tvbuff.c in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly validate certain length values for the MS-MMC dissector, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.

redhat
около 13 лет назад

epan/tvbuff.c in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly validate certain length values for the MS-MMC dissector, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.

nvd
около 13 лет назад

epan/tvbuff.c in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly validate certain length values for the MS-MMC dissector, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.

github
больше 3 лет назад

epan/tvbuff.c in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly validate certain length values for the MS-MMC dissector, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.