ID |
CVE-2012-6061
|
Summary |
The dissect_wtp_common function in epan/dissectors/packet-wtp.c in the WTP dissector in Wireshark 1.6.x before 1.6.12 and 1.8.x before 1.8.4 uses an incorrect data type for a certain length field, which allows remote attackers to cause a denial of service (integer overflow and infinite loop) via a crafted value in a packet. |
References |
|
Vulnerable Configurations |
-
cpe:2.3:a:wireshark:wireshark:1.6.0:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:1.6.0:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:1.6.1:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:1.6.1:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:1.6.2:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:1.6.2:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:1.6.3:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:1.6.3:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:1.6.4:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:1.6.4:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:1.6.5:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:1.6.5:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:1.6.6:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:1.6.6:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:1.6.7:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:1.6.7:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:1.6.8:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:1.6.8:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:1.6.9:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:1.6.9:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:1.6.10:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:1.6.10:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:1.6.11:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:1.6.11:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:1.8.0:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:1.8.0:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:1.8.1:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:1.8.1:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:1.8.2:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:1.8.2:*:*:*:*:*:*:*
-
cpe:2.3:a:wireshark:wireshark:1.8.3:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:1.8.3:*:*:*:*:*:*:*
|
CVSS |
Base: | 5.0 (as of 19-09-2017 - 01:35) |
Impact: | |
Exploitability: | |
|
CWE |
CWE-189 |
CAPEC |
|
Access |
Vector | Complexity | Authentication |
NETWORK |
LOW |
NONE |
|
Impact |
Confidentiality | Integrity | Availability |
NONE |
NONE |
PARTIAL |
|
cvss-vector
via4
|
AV:N/AC:L/Au:N/C:N/I:N/A:P
|
oval
via4
|
accepted | 2013-08-19T04:01:05.726-04:00 | class | vulnerability | contributors | name | Shane Shaffer | organization | G2, Inc. |
name | Shane Shaffer | organization | G2, Inc. |
| definition_extensions | comment | Wireshark is installed on the system. | oval | oval:org.mitre.oval:def:6589 |
| description | The dissect_wtp_common function in epan/dissectors/packet-wtp.c in the WTP dissector in Wireshark 1.6.x before 1.6.12 and 1.8.x before 1.8.4 uses an incorrect data type for a certain length field, which allows remote attackers to cause a denial of service (integer overflow and infinite loop) via a crafted value in a packet. | family | windows | id | oval:org.mitre.oval:def:15253 | status | accepted | submitted | 2012-12-06T10:48:55.334-05:00 | title | The dissect_wtp_common function in epan/dissectors/packet-wtp.c in the WTP dissector in Wireshark 1.6.x before 1.6.12 and 1.8.x before 1.8.4 uses an incorrect data type for a certain length field | version | 7 |
|
redhat
via4
|
advisories | | rpms | - wireshark-0:1.8.10-4.el6
- wireshark-debuginfo-0:1.8.10-4.el6
- wireshark-devel-0:1.8.10-4.el6
- wireshark-gnome-0:1.8.10-4.el6
- wireshark-0:1.0.15-6.el5_10
- wireshark-debuginfo-0:1.0.15-6.el5_10
- wireshark-gnome-0:1.0.15-6.el5_10
|
|
refmap
via4
|
confirm | | suse | - openSUSE-SU-2012:1633
- openSUSE-SU-2013:0151
|
|
Last major update |
19-09-2017 - 01:35 |
Published |
05-12-2012 - 11:57 |
Last modified |
19-09-2017 - 01:35 |