wireshark
Page content
- Author: Miklos Vajna
- Vulnerable: 1.4.2-1haven1
- Unaffected: 1.4.3-1haven1
Multiple vulnerabilities have been reported in Wireshark, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.
- A boundary error in the “dissect_enttec_dmx_data()” function (epan/dissectors/packet-enttec.c) when processing RLE Compressed DMX data of the ENTTEC protocol can be exploited to cause a buffer overflow via a specially crafted packet sent to UDP port 3333.
- A boundary error in the MAC-LTE dissector (epan/dissectors/packet-mac-lte.c) can be exploited to cause a stack-based buffer overflow.
- A boundary error in the “snmp_usm_password_to_key_sha1()” function (asn1/snmp/packet-snmp-template.c) can be exploited to cause a stack-based buffer overflow. Successful exploitation of vulnerabilities #1, #2, and #3 may allow execution of arbitrary code.
- An error in the ASN.1 BER dissector can be exploited to corrupt memory and cause the process to terminate.
- Bug Tracker URL: http://bugs.frugalware.org/task/4410