Format string vulnerability in Wireshark 0.99.8 through 1.0.5 on non-Windows platforms allows local users to cause a denial of service (application crash) via format string specifiers in the HOME environment variable.
The product uses a function that accepts a format string as an argument, but the format string originates from an external source.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Wireshark | Wireshark | 0.99.8 (including) | 0.99.8 (including) |
Wireshark | Wireshark | 1.0.0 (including) | 1.0.0 (including) |
Wireshark | Wireshark | 1.0.1 (including) | 1.0.1 (including) |
Wireshark | Wireshark | 1.0.2 (including) | 1.0.2 (including) |
Wireshark | Wireshark | 1.0.3 (including) | 1.0.3 (including) |
Wireshark | Wireshark | 1.0.4 (including) | 1.0.4 (including) |
Wireshark | Wireshark | 1.0.5 (including) | 1.0.5 (including) |
Wireshark | Ubuntu | devel | * |
Wireshark | Ubuntu | gutsy | * |
Wireshark | Ubuntu | hardy | * |
Wireshark | Ubuntu | intrepid | * |
Wireshark | Ubuntu | jaunty | * |
Wireshark | Ubuntu | karmic | * |
Wireshark | Ubuntu | lucid | * |
Wireshark | Ubuntu | maverick | * |
Wireshark | Ubuntu | natty | * |
Wireshark | Ubuntu | oneiric | * |
Wireshark | Ubuntu | upstream | * |