Skip to main content

Wireshark "dissect_enttec_dmx_data()" Buffer Overflow Vulnerability

Last Update Date: 28 Jan 2011 Release Date: 4 Jan 2011 5913 Views

RISK: Medium Risk

A vulnerability has been identified in Wireshark, which could be exploited by attackers to cause a denial of service or execute arbitrary code. This issue is caused by a buffer overflow error in the "dissect_enttec_dmx_data()" [epan/dissectors/packet-enttec.c] function when uncompressing DMX data within ENTTEC packets, which could be exploited by attackers to crash an affected application or execute arbitrary code by sending malformed packets or by convincing a user to open a malicious capture file.


Impact

  • Denial of Service
  • Remote Code Execution

System / Technologies affected

  • Wireshark version 1.4.2 and prior

Solutions

Before installation of the software, please visit the software manufacturer web-site for more details.


Vulnerability Identifier

  • No CVE information is available

Source


Related Link