CVE-2012-1595
Published: 11 April 2012
The pcap_process_pseudo_header function in wiretap/pcap-common.c in Wireshark 1.4.x before 1.4.12 and 1.6.x before 1.6.6 allows remote attackers to cause a denial of service (application crash) via a WTAP_ENCAP_ERF file containing an Extension or Multi-Channel header with an invalid pseudoheader size, related to the pcap and pcap-ng file parsers.
Notes
Author | Note |
---|---|
tyhicks | Versions affected: 1.4.0 to 1.4.11, 1.6.0 to 1.6.5 |
Priority
Status
Package | Release | Status |
---|---|---|
wireshark Launchpad, Ubuntu, Debian |
hardy |
Not vulnerable
|
lucid |
Not vulnerable
|
|
maverick |
Not vulnerable
|
|
natty |
Ignored
(end of life)
|
|
oneiric |
Ignored
(end of life)
|
|
precise |
Not vulnerable
(1.6.6-1)
|
|
quantal |
Not vulnerable
(1.6.6-1)
|
|
raring |
Not vulnerable
(1.6.6-1)
|
|
upstream |
Released
(1.4.12, 1.6.6)
|
|
Patches: upstream: http://anonsvn.wireshark.org/viewvc?view=revision&revision=41056 |