Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Vulnerabilities » CVE-2012-6054

Overview

Vulnerability Score 5.0 5.0
CVE Id CVE-2012-6054
Last Modified 02 Nov 2013 11:28:55
Published 05 Dec 2012 06:57:19
Confidentiality Impact NONE NONE
Integrity Impact NONE NONE
Availability Impact PARTIAL PARTIAL
Access Vector NETWORK
Access Complexity LOW
Authentication NONE

CVE-2012-6054

Summary

The dissect_sflow_245_address_type function in epan/dissectors/packet-sflow.c in the sFlow dissector in Wireshark 1.8.x before 1.8.4 does not properly handle length calculations for an invalid IP address type, which allows remote attackers to cause a denial of service (infinite loop) via a packet that is neither IPv4 nor IPv6.

Vulnerable Systems

Application

  • Wireshark 1.8.0

  • Wireshark 1.8.1

  • Wireshark 1.8.2

  • Wireshark 1.8.3


References

CONFIRM - http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-sflow.c?r1=45324&r2=45323&pathrev=45324

CONFIRM - https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7789

CONFIRM - http://www.wireshark.org/security/wnpa-sec-2012-32.html

CONFIRM - http://anonsvn.wireshark.org/viewvc?view=revision&revision=45324

SUSE - openSUSE-SU-2013:0151

SUSE - openSUSE-SU-2012:1633


Last Updated: 27 May 2016 10:53:45