Multiple unspecified vulnerabilities in Wireshark 1.2.0 allow remote attackers to cause a denial of service (application crash) via a file that records a malformed packet trace and is processed by the (1) Bluetooth L2CAP, (2) RADIUS, or (3) MIOP dissector. NOTE: it was later reported that the RADIUS issue also affects 0.10.13 through 1.0.9.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Wireshark | Wireshark | 1.0.0 (including) | 1.0.0 (including) |
Wireshark | Wireshark | 1.0.1 (including) | 1.0.1 (including) |
Wireshark | Wireshark | 1.0.2 (including) | 1.0.2 (including) |
Wireshark | Wireshark | 1.0.3 (including) | 1.0.3 (including) |
Wireshark | Wireshark | 1.0.4 (including) | 1.0.4 (including) |
Wireshark | Wireshark | 1.0.5 (including) | 1.0.5 (including) |
Wireshark | Wireshark | 1.0.6 (including) | 1.0.6 (including) |
Wireshark | Wireshark | 1.0.7 (including) | 1.0.7 (including) |
Wireshark | Wireshark | 1.0.8 (including) | 1.0.8 (including) |
Wireshark | Wireshark | 1.0.9 (including) | 1.0.9 (including) |
Wireshark | Wireshark | 1.2.0 (including) | 1.2.0 (including) |
Red Hat Enterprise Linux 3 | RedHat | wireshark-0:1.0.11-EL3.6 | * |
Red Hat Enterprise Linux 4 | RedHat | wireshark-0:1.0.11-1.el4_8.5 | * |
Red Hat Enterprise Linux 5 | RedHat | wireshark-0:1.0.11-1.el5_5.5 | * |
Ethereal | Ubuntu | dapper | * |
Wireshark | Ubuntu | hardy | * |
Wireshark | Ubuntu | intrepid | * |
Wireshark | Ubuntu | jaunty | * |
Wireshark | Ubuntu | karmic | * |
Wireshark | Ubuntu | upstream | * |