CVE-2012-1595

The pcap_process_pseudo_header function in wiretap/pcap-common.c in Wireshark 1.4.x before 1.4.12 and 1.6.x before 1.6.6 allows remote attackers to cause a denial of service (application crash) via a WTAP_ENCAP_ERF file containing an Extension or Multi-Channel header with an invalid pseudoheader size, related to the pcap and pcap-ng file parsers.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:wireshark:wireshark:1.4.0:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:1.4.1:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:1.4.2:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:1.4.3:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:1.4.4:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:1.4.5:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:1.4.6:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:1.4.7:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:1.4.8:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:1.4.9:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:1.4.10:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:1.4.11:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:wireshark:wireshark:1.6.0:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:1.6.1:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:1.6.2:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:1.6.3:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:1.6.4:*:*:*:*:*:*:*
cpe:2.3:a:wireshark:wireshark:1.6.5:*:*:*:*:*:*:*

History

13 Feb 2023, 04:33

Type Values Removed Values Added
References
  • {'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=807644', 'name': 'https://bugzilla.redhat.com/show_bug.cgi?id=807644', 'tags': [], 'refsource': 'MISC'}
  • {'url': 'https://access.redhat.com/security/cve/CVE-2012-1595', 'name': 'https://access.redhat.com/security/cve/CVE-2012-1595', 'tags': [], 'refsource': 'MISC'}
  • {'url': 'https://access.redhat.com/errata/RHSA-2012:0509', 'name': 'https://access.redhat.com/errata/RHSA-2012:0509', 'tags': [], 'refsource': 'MISC'}
Summary CVE-2012-1595 wireshark: Heap-based buffer overflow when reading ERF packets from pcap/pcap-ng trace files The pcap_process_pseudo_header function in wiretap/pcap-common.c in Wireshark 1.4.x before 1.4.12 and 1.6.x before 1.6.6 allows remote attackers to cause a denial of service (application crash) via a WTAP_ENCAP_ERF file containing an Extension or Multi-Channel header with an invalid pseudoheader size, related to the pcap and pcap-ng file parsers.

02 Feb 2023, 15:15

Type Values Removed Values Added
References
  • (MISC) https://bugzilla.redhat.com/show_bug.cgi?id=807644 -
  • (MISC) https://access.redhat.com/security/cve/CVE-2012-1595 -
  • (MISC) https://access.redhat.com/errata/RHSA-2012:0509 -
Summary The pcap_process_pseudo_header function in wiretap/pcap-common.c in Wireshark 1.4.x before 1.4.12 and 1.6.x before 1.6.6 allows remote attackers to cause a denial of service (application crash) via a WTAP_ENCAP_ERF file containing an Extension or Multi-Channel header with an invalid pseudoheader size, related to the pcap and pcap-ng file parsers. CVE-2012-1595 wireshark: Heap-based buffer overflow when reading ERF packets from pcap/pcap-ng trace files

Information

Published : 2012-04-11 10:39

Updated : 2023-12-10 11:16


NVD link : CVE-2012-1595

Mitre link : CVE-2012-1595

CVE.ORG link : CVE-2012-1595


JSON object : View

Products Affected

wireshark

  • wireshark
CWE
CWE-399

Resource Management Errors