[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249966

 
 

909

 
 

195636

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

Off-by-one error vulnerability in the is_rtsp_request_or_reply function in Wireshark (Mac OS X)

ID: oval:org.secpod.oval:def:21212Date: (C)2014-09-23   (M)2023-12-07
Class: VULNERABILITYFamily: macos




The host is installed with Wireshark 1.10.x before 1.10.10 or 1.12.x before 1.12.1 and is prone to an off-by-one error vulnerability. A flaw is present in the application, which fails to properly handle a crafted packet that triggers parsing of a token located one position beyond the current position. Successful exploitation could allow attackers to crash the service.

Platform:
Apple Mac OS 14
Apple Mac OS 13
Apple Mac OS 12
Apple Mac OS 11
Apple Mac OS X 10.15
Apple Mac OS X 10.14
Apple Mac OS X 10.12
Apple Mac OS X 10.13
Apple Mac OS X 10.9
Apple Mac OS X 10.8
Apple Mac OS X 10.10
Apple Mac OS X Server 10.9
Apple Mac OS X Server 10.8
Apple Mac OS X Server 10.10
Product:
Wireshark
Reference:
CVE-2014-6427
CVE    1
CVE-2014-6427
CPE    12
cpe:/a:wireshark:wireshark:1.10.3
cpe:/a:wireshark:wireshark:1.10.2
cpe:/a:wireshark:wireshark:1.12.0
cpe:/a:wireshark:wireshark:1.10.1
...

© SecPod Technologies