![]() ![]() Red Hat Enterprise Linux version 4: wireshark-1.0.15-2.el4 Solutions for this threat Wireshark: patch for pcap-ng.Ī patch is available in information sources. The trust level is of type confirmed by the editor, with an origin of document.Īn attacker with a expert ability can exploit this security note. Our team determined that the severity of this computer weakness bulletin is medium. This security vulnerability impacts software or systems such as Ethereal, RHEL, Wireshark. If this size is larger than the packet size (packet.packet_len) or larger than WTAP_MAX_PACKET_SIZE, a buffer overflow occurs.Īn attacker can therefore invite the victim to open a malicious pcap-ng file with Wireshark, in order to create an overflow, which leads to a denial of service and possibly to code execution.įull bulletin, software filtering, emails, fixes. When Wireshark opens a pcap-ng file, it does not check the size of captured data (packet.cap_len). The pcap-ng file format stores captured packets. Vulnerable software: Ethereal, RHEL, Wireshark. Vulnerability of Wireshark: buffer overflow via pcap-ng Synthesis of the vulnerabilityĪn attacker can invite the victim to open a malicious pcap-ng file with Wireshark, in order to create an overflow, which leads to a denial of service and possibly to code execution. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |