[Forgot Password]
Login  Register Subscribe

23631

 
 

115036

 
 

95906

 
 

909

 
 

77949

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2012-4294

Date: (C)2012-08-16   (M)2017-09-22
 
CVSS Score: 5.8Access Vector: ADJACENT_NETWORK
Exploitability Subscore: 6.5Access Complexity: LOW
Impact Subscore: 6.4Authentication: NONE
 Confidentiality: PARTIAL
 Integrity: PARTIAL
 Availability: PARTIAL











Buffer overflow in the channelised_fill_sdh_g707_format function in epan/dissectors/packet-erf.c in the ERF dissector in Wireshark 1.8.x before 1.8.2 allows remote attackers to execute arbitrary code via a large speed (aka rate) value.

Reference:
SECUNIA-50276
SECUNIA-51363
SECUNIA-54425
BID-55035
GLSA-201308-05
http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-erf.c?r1=44377&r2=44376&pathrev=44377
http://anonsvn.wireshark.org/viewvc?view=revision&revision=44377
http://www.wireshark.org/security/wnpa-sec-2012-16.html
https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_wireshark3
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7563
openSUSE-SU-2012:1067

CPE    3
cpe:/a:wireshark:wireshark:1.8.1
cpe:/a:wireshark:wireshark:1.8.0
cpe:/o:sun:sunos:5.11
CWE    1
CWE-119
OVAL    2
oval:org.secpod.oval:def:6777
oval:org.secpod.oval:def:6914

© 2013 SecPod Technologies