Multiple buffer overflows in the LWRES dissector in Wireshark 0.9.15 up to and including 1.0.10 and 1.2.0 up to and including 1.2.5 allow remote malicious users to cause a denial of service (crash) via a malformed packet, as demonstrated using a stack-based buffer overflow to the dissect_getaddrsbyname_request function.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
wireshark wireshark 1.0.9 |
||
wireshark wireshark 1.0.8 |
||
wireshark wireshark 1.0.0 |
||
wireshark wireshark 1.0 |
||
wireshark wireshark 1.2.5 |
||
wireshark wireshark 1.0.5 |
||
wireshark wireshark 1.0.4 |
||
wireshark wireshark 1.2.1 |
||
wireshark wireshark 1.2.2 |
||
wireshark wireshark 1.0.7 |
||
wireshark wireshark 1.0.6 |
||
wireshark wireshark 1.2 |
||
wireshark wireshark 1.2.0 |
||
wireshark wireshark 0.9.15 |
||
wireshark wireshark 1.0.10 |
||
wireshark wireshark 1.0.3 |
||
wireshark wireshark 1.0.2 |
||
wireshark wireshark 1.0.1 |
||
wireshark wireshark 1.2.3 |
||
wireshark wireshark 1.2.4 |