Описание
The dissect_wtp_common function in epan/dissectors/packet-wtp.c in the WTP dissector in Wireshark 1.6.x before 1.6.12 and 1.8.x before 1.8.4 uses an incorrect data type for a certain length field, which allows remote attackers to cause a denial of service (integer overflow and infinite loop) via a crafted value in a packet.
Релиз | Статус | Примечание |
---|---|---|
devel | not-affected | 1.12.1+g01b65bf-2 |
esm-apps/xenial | not-affected | 1.12.1+g01b65bf-2 |
esm-infra-legacy/trusty | not-affected | 1.10.6-1 |
hardy | ignored | end of life |
lucid | ignored | end of life |
oneiric | ignored | end of life |
precise | ignored | end of life |
precise/esm | DNE | precise was needed |
quantal | ignored | end of life |
raring | ignored | end of life |
Показывать по
Ссылки на источники
EPSS
5 Medium
CVSS2
Связанные уязвимости
The dissect_wtp_common function in epan/dissectors/packet-wtp.c in the WTP dissector in Wireshark 1.6.x before 1.6.12 and 1.8.x before 1.8.4 uses an incorrect data type for a certain length field, which allows remote attackers to cause a denial of service (integer overflow and infinite loop) via a crafted value in a packet.
The dissect_wtp_common function in epan/dissectors/packet-wtp.c in the WTP dissector in Wireshark 1.6.x before 1.6.12 and 1.8.x before 1.8.4 uses an incorrect data type for a certain length field, which allows remote attackers to cause a denial of service (integer overflow and infinite loop) via a crafted value in a packet.
The dissect_wtp_common function in epan/dissectors/packet-wtp.c in the ...
The dissect_wtp_common function in epan/dissectors/packet-wtp.c in the WTP dissector in Wireshark 1.6.x before 1.6.12 and 1.8.x before 1.8.4 uses an incorrect data type for a certain length field, which allows remote attackers to cause a denial of service (integer overflow and infinite loop) via a crafted value in a packet.
EPSS
5 Medium
CVSS2