Описание
The bytes_repr_len function in Wireshark 1.4.5 uses an incorrect pointer argument, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via arbitrary TCP traffic.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | not-affected | 1.4.6-1 |
| hardy | ignored | end of life |
| lucid | ignored | end of life |
| maverick | ignored | end of life |
| natty | not-affected | 1.4.6-1 |
| oneiric | not-affected | 1.4.6-1 |
| precise | not-affected | 1.4.6-1 |
| quantal | not-affected | 1.4.6-1 |
| raring | not-affected | 1.4.6-1 |
| saucy | not-affected | 1.4.6-1 |
Показывать по
EPSS
4.3 Medium
CVSS2
Связанные уязвимости
The bytes_repr_len function in Wireshark 1.4.5 uses an incorrect pointer argument, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via arbitrary TCP traffic.
The bytes_repr_len function in Wireshark 1.4.5 uses an incorrect point ...
The bytes_repr_len function in Wireshark 1.4.5 uses an incorrect pointer argument, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via arbitrary TCP traffic.
EPSS
4.3 Medium
CVSS2