4.3
CVSSv2

CVE-2012-1595

Published: 11/04/2012 Updated: 13/02/2023
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P

Vulnerability Summary

The pcap_process_pseudo_header function in wiretap/pcap-common.c in Wireshark 1.4.x prior to 1.4.12 and 1.6.x prior to 1.6.6 allows remote malicious users to cause a denial of service (application crash) via a WTAP_ENCAP_ERF file containing an Extension or Multi-Channel header with an invalid pseudoheader size, related to the pcap and pcap-ng file parsers.

Vulnerable Product Search on Vulmon Subscribe to Product

wireshark wireshark 1.4.7

wireshark wireshark 1.4.11

wireshark wireshark 1.4.2

wireshark wireshark 1.4.0

wireshark wireshark 1.4.5

wireshark wireshark 1.4.4

wireshark wireshark 1.4.10

wireshark wireshark 1.4.9

wireshark wireshark 1.4.6

wireshark wireshark 1.4.3

wireshark wireshark 1.4.1

wireshark wireshark 1.4.8

wireshark wireshark 1.6.0

wireshark wireshark 1.6.4

wireshark wireshark 1.6.5

wireshark wireshark 1.6.3

wireshark wireshark 1.6.1

wireshark wireshark 1.6.2

Vendor Advisories

Synopsis Moderate: wireshark security update Type/Severity Security Advisory: Moderate Topic Updated wireshark packages that fix several security issues are nowavailable for Red Hat Enterprise Linux 6The Red Hat Security Response Team has rated this update as having moderatesecurity impact Common Vulnerab ...
Debian Bug report logs - #666058 Multiple wireshark security flaws resolved in 1412 and 166 (CVE-2012-1593,CVE-2012-1594,CVE-2012-1595,CVE-2012-1596) Package: wireshark; Maintainer for wireshark is Balint Reczey <rbalint@ubuntucom>; Source for wireshark is src:wireshark (PTS, buildd, popcon) Reported by: Henri Salo < ...