Integer overflow in the dissect_tnef function in epan/dissectors/packet-tnef.c in the TNEF dissector in Wireshark 1.10.x prior to 1.10.13 and 1.12.x prior to 1.12.4 allows remote malicious users to cause a denial of service (infinite loop) via a crafted length field in a packet.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
debian debian linux 8.0 |
||
debian debian linux 7.0 |
||
mageia mageia 4.0 |
||
wireshark wireshark 1.10.8 |
||
wireshark wireshark 1.12.0 |
||
wireshark wireshark 1.10.6 |
||
wireshark wireshark 1.10.9 |
||
wireshark wireshark 1.10.12 |
||
wireshark wireshark 1.10.10 |
||
wireshark wireshark 1.10.0 |
||
wireshark wireshark 1.12.2 |
||
wireshark wireshark 1.10.3 |
||
wireshark wireshark 1.10.2 |
||
wireshark wireshark 1.10.1 |
||
wireshark wireshark 1.12.1 |
||
wireshark wireshark 1.10.7 |
||
wireshark wireshark 1.10.4 |
||
wireshark wireshark 1.12.3 |
||
wireshark wireshark 1.10.5 |
||
wireshark wireshark 1.10.11 |
||
opensuse opensuse 13.1 |
||
opensuse opensuse 13.2 |