Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2012-4294

Опубликовано: 15 авг. 2012
Источник: redhat
CVSS2: 6.8
EPSS Низкий

Описание

Buffer overflow in the channelised_fill_sdh_g707_format function in epan/dissectors/packet-erf.c in the ERF dissector in Wireshark 1.8.x before 1.8.2 allows remote attackers to execute arbitrary code via a large speed (aka rate) value.

Отчет

This issue did not affect the versions of wireshark as shipped with Red Hat Enterprise Linux 5 and 6.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5wiresharkNot affected
Red Hat Enterprise Linux 6wiresharkNot affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-119
https://bugzilla.redhat.com/show_bug.cgi?id=848554wireshark: buffer overflow in ERF dissector (wnpa-sec-2012-16)

EPSS

Процентиль: 87%
0.03416
Низкий

6.8 Medium

CVSS2

Связанные уязвимости

ubuntu
около 13 лет назад

Buffer overflow in the channelised_fill_sdh_g707_format function in epan/dissectors/packet-erf.c in the ERF dissector in Wireshark 1.8.x before 1.8.2 allows remote attackers to execute arbitrary code via a large speed (aka rate) value.

nvd
около 13 лет назад

Buffer overflow in the channelised_fill_sdh_g707_format function in epan/dissectors/packet-erf.c in the ERF dissector in Wireshark 1.8.x before 1.8.2 allows remote attackers to execute arbitrary code via a large speed (aka rate) value.

debian
около 13 лет назад

Buffer overflow in the channelised_fill_sdh_g707_format function in ep ...

github
около 3 лет назад

Buffer overflow in the channelised_fill_sdh_g707_format function in epan/dissectors/packet-erf.c in the ERF dissector in Wireshark 1.8.x before 1.8.2 allows remote attackers to execute arbitrary code via a large speed (aka rate) value.

EPSS

Процентиль: 87%
0.03416
Низкий

6.8 Medium

CVSS2