CVE-2010-4538
Published: 7 January 2011
Buffer overflow in the sect_enttec_dmx_da function in epan/dissectors/packet-enttec.c in Wireshark 1.4.2 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted ENTTEC DMX packet with Run Length Encoding (RLE) compression.
Priority
Status
Package | Release | Status |
---|---|---|
wireshark Launchpad, Ubuntu, Debian |
dapper |
Does not exist
|
hardy |
Ignored
(end of life)
|
|
karmic |
Ignored
(end of life)
|
|
lucid |
Ignored
(end of life)
|
|
maverick |
Released
(1.2.11-6build0.10.10.1)
|
|
natty |
Not vulnerable
(1.4.4-1)
|
|
oneiric |
Not vulnerable
(1.4.4-1)
|
|
precise |
Not vulnerable
(1.4.4-1)
|
|
quantal |
Not vulnerable
(1.4.4-1)
|
|
raring |
Not vulnerable
(1.4.4-1)
|
|
saucy |
Not vulnerable
(1.4.4-1)
|
|
upstream |
Released
(1.2.11-6, 1.4.4-1)
|
|
Patches: upstream: http://anonsvn.wireshark.org/viewvc?view=rev&revision=35318 |