epan/dissectors/packet-ldap.c in Wireshark 1.0.x, 1.2.0 through 1.2.14, and 1.4.0 through 1.4.3 allows remote attackers to cause a denial of service (memory consumption) via (1) a long LDAP filter string or (2) an LDAP filter string containing many elements.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Wireshark | Wireshark | 1.0 (including) | 1.0 (including) |
Wireshark | Wireshark | 1.0.0 (including) | 1.0.0 (including) |
Wireshark | Wireshark | 1.0.1 (including) | 1.0.1 (including) |
Wireshark | Wireshark | 1.0.2 (including) | 1.0.2 (including) |
Wireshark | Wireshark | 1.0.3 (including) | 1.0.3 (including) |
Wireshark | Wireshark | 1.0.4 (including) | 1.0.4 (including) |
Wireshark | Wireshark | 1.0.5 (including) | 1.0.5 (including) |
Wireshark | Wireshark | 1.0.6 (including) | 1.0.6 (including) |
Wireshark | Wireshark | 1.0.7 (including) | 1.0.7 (including) |
Wireshark | Wireshark | 1.0.8 (including) | 1.0.8 (including) |
Wireshark | Wireshark | 1.0.9 (including) | 1.0.9 (including) |
Wireshark | Wireshark | 1.0.10 (including) | 1.0.10 (including) |
Wireshark | Wireshark | 1.0.11 (including) | 1.0.11 (including) |
Wireshark | Wireshark | 1.0.12 (including) | 1.0.12 (including) |
Wireshark | Wireshark | 1.0.13 (including) | 1.0.13 (including) |
Wireshark | Wireshark | 1.0.14 (including) | 1.0.14 (including) |
Wireshark | Wireshark | 1.0.15 (including) | 1.0.15 (including) |
Wireshark | Wireshark | 1.0.16 (including) | 1.0.16 (including) |
Red Hat Enterprise Linux 4 | RedHat | wireshark-0:1.0.15-2.el4 | * |
Red Hat Enterprise Linux 5 | RedHat | wireshark-0:1.0.15-1.el5_6.4 | * |
Red Hat Enterprise Linux 6 | RedHat | wireshark-0:1.2.15-1.el6_0.1 | * |
Wireshark | Ubuntu | hardy | * |
Wireshark | Ubuntu | karmic | * |
Wireshark | Ubuntu | lucid | * |
Wireshark | Ubuntu | maverick | * |
Wireshark | Ubuntu | upstream | * |