5
CVSSv2

CVE-2012-6061

Published: 05/12/2012 Updated: 19/09/2017
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

The dissect_wtp_common function in epan/dissectors/packet-wtp.c in the WTP dissector in Wireshark 1.6.x prior to 1.6.12 and 1.8.x prior to 1.8.4 uses an incorrect data type for a certain length field, which allows remote malicious users to cause a denial of service (integer overflow and infinite loop) via a crafted value in a packet.

Vulnerable Product Search on Vulmon Subscribe to Product

wireshark wireshark 1.6.10

wireshark wireshark 1.6.11

wireshark wireshark 1.6.2

wireshark wireshark 1.6.9

wireshark wireshark 1.8.0

wireshark wireshark 1.6.0

wireshark wireshark 1.6.1

wireshark wireshark 1.6.7

wireshark wireshark 1.6.8

wireshark wireshark 1.6.5

wireshark wireshark 1.6.6

wireshark wireshark 1.8.3

wireshark wireshark 1.6.3

wireshark wireshark 1.6.4

wireshark wireshark 1.8.1

wireshark wireshark 1.8.2

Vendor Advisories

Synopsis Moderate: wireshark security, bug fix, and enhancement update Type/Severity Security Advisory: Moderate Topic Updated wireshark packages that fix multiple security issues, several bugs,and add various enhancements are now available for Red Hat EnterpriseLinux 6The Red Hat Security Response Team ha ...
Two flaws were found in Wireshark If Wireshark read a malformed packet off a network or opened a malicious dump file, it could crash or, possibly, execute arbitrary code as the user running Wireshark (CVE-2013-3559, CVE-2013-4083) Several denial of service flaws were found in Wireshark Wireshark could crash or stop responding if it read a malfor ...