Описание
Heap-based buffer overflow in wiretap/pcapng.c in Wireshark before 1.2 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted capture file.
Затронутые пакеты
| Платформа | Пакет | Состояние | Рекомендация | Релиз |
|---|---|---|---|---|
| Red Hat Enterprise Linux 6 | wireshark | Not affected | ||
| Red Hat Enterprise Linux 4 | wireshark | Fixed | RHSA-2011:0370 | 21.03.2011 |
| Red Hat Enterprise Linux 5 | wireshark | Fixed | RHSA-2011:0370 | 21.03.2011 |
Показывать по
Дополнительная информация
Статус:
4.4 Medium
CVSS2
Связанные уязвимости
Heap-based buffer overflow in wiretap/pcapng.c in Wireshark before 1.2 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted capture file.
Heap-based buffer overflow in wiretap/pcapng.c in Wireshark before 1.2 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted capture file.
Heap-based buffer overflow in wiretap/pcapng.c in Wireshark before 1.2 ...
Heap-based buffer overflow in wiretap/pcapng.c in Wireshark before 1.2 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted capture file.
4.4 Medium
CVSS2