Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2013-1586

Опубликовано: 03 фев. 2013
Источник: debian
EPSS Низкий

Описание

The fragment_set_tot_len function in epan/reassemble.c in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly determine the length of a reassembled packet for the DTLS dissector, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
wiresharkfixed1.8.6-1package
wiresharkfixed1.8.2-5wheezy1wheezypackage

Примечания

  • Upstream bug: https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8111

  • http://anonsvn.wireshark.org/viewvc?view=revision&revision=46999

  • http://anonsvn.wireshark.org/viewvc?view=revision&revision=47000

EPSS

Процентиль: 56%
0.00335
Низкий

Связанные уязвимости

ubuntu
почти 13 лет назад

The fragment_set_tot_len function in epan/reassemble.c in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly determine the length of a reassembled packet for the DTLS dissector, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.

redhat
почти 13 лет назад

The fragment_set_tot_len function in epan/reassemble.c in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly determine the length of a reassembled packet for the DTLS dissector, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.

nvd
почти 13 лет назад

The fragment_set_tot_len function in epan/reassemble.c in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly determine the length of a reassembled packet for the DTLS dissector, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.

github
больше 3 лет назад

The fragment_set_tot_len function in epan/reassemble.c in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly determine the length of a reassembled packet for the DTLS dissector, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.

EPSS

Процентиль: 56%
0.00335
Низкий