Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

Wireshark Multiple Vulnerabilities - April 12 (Windows)

Information

Severity

Severity

Medium

Family

Family

General

CVSSv2 Base

CVSSv2 Base

5.8

CVSSv2 Vector

CVSSv2 Vector

AV:A/AC:L/Au:N/C:P/I:P/A:P

Solution Type

Solution Type

Vendor Patch

Created

Created

12 years ago

Modified

Modified

5 years ago

Summary

This host is installed with Wireshark and is prone to multiple vulnerabilities.

Insight

Insight

The flaws are due to - NULL pointer dereference errors when reading certain packet information can be exploited to cause a crash. - An error within the RLC dissector can be exploited to cause a buffer overflow via a specially crafted RLC packet capture file. - An error within the 'lanalyzer_read()' function (wiretap/lanalyzer.c) when parsing LANalyzer files can be exploited to cause a heap-based buffer underflow.

Affected Software

Affected Software

Wireshark versions 1.4.x before 1.4.11 and 1.6.x before 1.6.5 on Windows

Solution

Solution

Upgrade to the Wireshark version 1.4.11, 1.6.5 or later.