ID |
CVE-2011-1956
|
Summary |
The bytes_repr_len function in Wireshark 1.4.5 uses an incorrect pointer argument, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via arbitrary TCP traffic. Per: http://cwe.mitre.org/data/definitions/476.html
'CWE-476: NULL Pointer Dereference' |
References |
|
Vulnerable Configurations |
|
CVSS |
Base: | 4.3 (as of 19-09-2017 - 01:32) |
Impact: | |
Exploitability: | |
|
CWE |
NVD-CWE-Other |
CAPEC |
|
Access |
Vector | Complexity | Authentication |
NETWORK |
MEDIUM |
NONE |
|
Impact |
Confidentiality | Integrity | Availability |
NONE |
NONE |
PARTIAL |
|
cvss-vector
via4
|
AV:N/AC:M/Au:N/C:N/I:N/A:P
|
oval
via4
|
accepted | 2013-08-19T04:00:45.120-04:00 | class | vulnerability | contributors | name | Shane Shaffer | organization | G2, Inc. |
name | Shane Shaffer | organization | G2, Inc. |
name | Shane Shaffer | organization | G2, Inc. |
| definition_extensions | comment | Wireshark is installed on the system. | oval | oval:org.mitre.oval:def:6589 |
| description | The bytes_repr_len function in Wireshark 1.4.5 uses an incorrect pointer argument, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via arbitrary TCP traffic. | family | windows | id | oval:org.mitre.oval:def:14943 | status | accepted | submitted | 2012-02-27T15:34:33.178-04:00 | title | Vulnerability in bytes_repr_len function in Wireshark 1.4.5 | version | 8 |
|
refmap
via4
|
confirm | | mlist | - [oss-security] 20110531 CVE request for Wireshark 1.4.5 TCP DoS issue
- [oss-security] 20110601 Re: CVE request for Wireshark 1.4.5 TCP DoS issue
| secunia | 44449 | xf | wireshark-desegmenttcp-dos(67789) |
|
Last major update |
19-09-2017 - 01:32 |
Published |
06-06-2011 - 19:55 |
Last modified |
19-09-2017 - 01:32 |