Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2013-1587

Опубликовано: 03 фев. 2013
Источник: debian
EPSS Низкий

Описание

The dissect_rohc_ir_packet function in epan/dissectors/packet-rohc.c in the ROHC dissector in Wireshark 1.8.x before 1.8.5 does not properly handle unknown profiles, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
wiresharkfixed1.8.6-1package
wiresharknot-affectedsqueezepackage
wiresharkfixed1.8.2-5wheezy1wheezypackage

Примечания

  • Upstream bug: https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7679

  • Upstream patch: http://anonsvn.wireshark.org/viewvc?view=revision&revision=44700

EPSS

Процентиль: 45%
0.00228
Низкий

Связанные уязвимости

ubuntu
около 13 лет назад

The dissect_rohc_ir_packet function in epan/dissectors/packet-rohc.c in the ROHC dissector in Wireshark 1.8.x before 1.8.5 does not properly handle unknown profiles, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.

redhat
около 13 лет назад

The dissect_rohc_ir_packet function in epan/dissectors/packet-rohc.c in the ROHC dissector in Wireshark 1.8.x before 1.8.5 does not properly handle unknown profiles, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.

nvd
около 13 лет назад

The dissect_rohc_ir_packet function in epan/dissectors/packet-rohc.c in the ROHC dissector in Wireshark 1.8.x before 1.8.5 does not properly handle unknown profiles, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.

github
больше 3 лет назад

The dissect_rohc_ir_packet function in epan/dissectors/packet-rohc.c in the ROHC dissector in Wireshark 1.8.x before 1.8.5 does not properly handle unknown profiles, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.

EPSS

Процентиль: 45%
0.00228
Низкий