Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2011-4102

Опубликовано: 21 окт. 2011
Источник: redhat
CVSS2: 4.4
EPSS Низкий

Описание

Heap-based buffer overflow in the erf_read_header function in wiretap/erf.c in the ERF file parser in Wireshark 1.4.0 through 1.4.9 and 1.6.x before 1.6.3 allows remote attackers to cause a denial of service (application crash) via a malformed file.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 4wiresharkWill not fix
Red Hat Enterprise Linux 5wiresharkFixedRHSA-2013:012508.01.2013
Red Hat Enterprise Linux 6wiresharkFixedRHSA-2012:050923.04.2012

Показывать по

Дополнительная информация

Статус:

Moderate
https://bugzilla.redhat.com/show_bug.cgi?id=750648wireshark: buffer overflow in the ERF file reader

EPSS

Процентиль: 70%
0.00646
Низкий

4.4 Medium

CVSS2

Связанные уязвимости

ubuntu
почти 14 лет назад

Heap-based buffer overflow in the erf_read_header function in wiretap/erf.c in the ERF file parser in Wireshark 1.4.0 through 1.4.9 and 1.6.x before 1.6.3 allows remote attackers to cause a denial of service (application crash) via a malformed file.

nvd
почти 14 лет назад

Heap-based buffer overflow in the erf_read_header function in wiretap/erf.c in the ERF file parser in Wireshark 1.4.0 through 1.4.9 and 1.6.x before 1.6.3 allows remote attackers to cause a denial of service (application crash) via a malformed file.

debian
почти 14 лет назад

Heap-based buffer overflow in the erf_read_header function in wiretap/ ...

github
около 3 лет назад

Heap-based buffer overflow in the erf_read_header function in wiretap/erf.c in the ERF file parser in Wireshark 1.4.0 through 1.4.9 and 1.6.x before 1.6.3 allows remote attackers to cause a denial of service (application crash) via a malformed file.

oracle-oval
больше 12 лет назад

ELSA-2013-0125: wireshark security, bug fix, and enhancement update (MODERATE)

EPSS

Процентиль: 70%
0.00646
Низкий

4.4 Medium

CVSS2