Описание
The fragment_add_seq_common function in epan/reassemble.c in the ASN.1 BER dissector in Wireshark before r48943 has an incorrect pointer dereference during a comparison, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | not-affected | 1.8.6-3 |
| lucid | not-affected | 1.2.7-1 |
| precise | not-affected | 1.6.7-1 |
| quantal | not-affected | 1.8.2-2 |
| raring | not-affected | 1.8.2-5 |
| upstream | released | 1.8.7, 1.6.15 |
Показывать по
5 Medium
CVSS2
Связанные уязвимости
The fragment_add_seq_common function in epan/reassemble.c in the ASN.1 BER dissector in Wireshark before r48943 has an incorrect pointer dereference during a comparison, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.
The fragment_add_seq_common function in epan/reassemble.c in the ASN.1 BER dissector in Wireshark before r48943 has an incorrect pointer dereference during a comparison, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.
The fragment_add_seq_common function in epan/reassemble.c in the ASN.1 ...
The fragment_add_seq_common function in epan/reassemble.c in the ASN.1 BER dissector in Wireshark before r48943 has an incorrect pointer dereference during a comparison, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.
5 Medium
CVSS2