Wireshark Multiple Vulnerabilities
Last Update Date:
31 Jan 2013 15:36
Release Date:
31 Jan 2013
4098
Views
RISK: Medium Risk
TYPE: Security software and application - Security Software & Appliance
Multiple vulnerabilities have been identified in Wireshark, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.
- Errors in the Bluetooth HCI, CSN.1, DCP-ETSI DOCSIS CM-STAUS, IEEE 802.3 Slow Protocols, MPLS, R3, RTPS, SDP, and SIP dissectors can be exploited to trigger infinite loops and consume CPU resources via specially crafted packets.
- An error in the CLNP, DTN, MS-MMC, DTLS and ROHC dissector, and the dissection engine when processing certain packets can be exploited to cause a crash via a specially crafted packet.
- An error in the DCP-ETSI dissector when processing certain packets can be exploited to cause a memory corruption via a specially crafted packet.
- An error in the NTLMSSP dissector when processing certain packets can be exploited to cause a buffer overflow via a specially crafted packet.
Successful exploitation of this vulnerability may allow execution of arbitrary code.
Impact
- Denial of Service
- Remote Code Execution
System / Technologies affected
- Versions prior to 1.8.5 and 1.6.13
Solutions
Before installation of the software, please visit the software manufacturer web-site for more details.
- Update to version 1.8.5 or 1.6.13.
Vulnerability Identifier
- No CVE information is available
Source
Related Link
Share with