plugins/ethercat/packet-ecatmb.c in the EtherCAT Mailbox dissector in Wireshark 1.4.x prior to 1.4.15, 1.6.x prior to 1.6.10, and 1.8.x prior to 1.8.2 does not properly handle certain integer fields, which allows remote malicious users to cause a denial of service (application exit) via a malformed packet.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
sun sunos 5.11 |
||
opensuse opensuse 11.4 |
||
opensuse opensuse 12.1 |
||
wireshark wireshark 1.6.4 |
||
wireshark wireshark 1.6.5 |
||
wireshark wireshark 1.6.6 |
||
wireshark wireshark 1.6.7 |
||
wireshark wireshark 1.6.2 |
||
wireshark wireshark 1.6.3 |
||
wireshark wireshark 1.6.0 |
||
wireshark wireshark 1.6.1 |
||
wireshark wireshark 1.6.8 |
||
wireshark wireshark 1.6.9 |
||
wireshark wireshark 1.8.1 |
||
wireshark wireshark 1.8.0 |
||
wireshark wireshark 1.4.0 |
||
wireshark wireshark 1.4.7 |
||
wireshark wireshark 1.4.8 |
||
wireshark wireshark 1.4.1 |
||
wireshark wireshark 1.4.2 |
||
wireshark wireshark 1.4.9 |
||
wireshark wireshark 1.4.10 |
||
wireshark wireshark 1.4.5 |
||
wireshark wireshark 1.4.6 |
||
wireshark wireshark 1.4.13 |
||
wireshark wireshark 1.4.14 |
||
wireshark wireshark 1.4.3 |
||
wireshark wireshark 1.4.4 |
||
wireshark wireshark 1.4.11 |
||
wireshark wireshark 1.4.12 |