Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Vulnerabilities » CVE-2011-4102

Overview

Vulnerability Score 4.3 4.3
CVE Id CVE-2011-4102
Last Modified 06 Feb 2013 11:48:35
Published 03 Nov 2011 11:55:01
Confidentiality Impact NONE NONE
Integrity Impact NONE NONE
Availability Impact PARTIAL PARTIAL
Access Vector NETWORK
Access Complexity MEDIUM
Authentication NONE

CVE-2011-4102

Summary

Heap-based buffer overflow in the erf_read_header function in wiretap/erf.c in the ERF file parser in Wireshark 1.4.0 through 1.4.9 and 1.6.x before 1.6.3 allows remote attackers to cause a denial of service (application crash) via a malformed file.

Vulnerable Systems

Application

  • Wireshark 1.4.0

  • Wireshark 1.4.1

  • Wireshark 1.4.2

  • Wireshark 1.4.3

  • Wireshark 1.4.4

  • Wireshark 1.4.5

  • Wireshark 1.4.6

  • Wireshark 1.4.7

  • Wireshark 1.4.8

  • Wireshark 1.4.9

  • Wireshark 1.6.0

  • Wireshark 1.6.1

  • Wireshark 1.6.2


References

CONFIRM - https://bugzilla.redhat.com/show_bug.cgi?id=750648

MLIST - [oss-security] 20111101 Re: CVE request for wireshark flaws

CONFIRM - http://anonsvn.wireshark.org/viewvc?view=revision&revision=39508

CONFIRM - https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6479

CONFIRM - http://www.wireshark.org/security/wnpa-sec-2011-19.html

XF - wireshark-erf-bo(71092)

BID - 50486

SECUNIA - 46644

OSVDB - 76770

SECUNIA - 46913

SECUNIA - 48947

REDHAT - RHSA-2013:0125

Related Patches

Red Hat 2013:0125-01 RHSA Moderate: wireshark security, bug fix, and enhancement update for RHEL 5 x86


Last Updated: 27 May 2016 10:57:23