Wireshark 1.4.x before 1.4.11 and 1.6.x before 1.6.5 does not properly perform certain string conversions, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted packet, related to epan/to_str.c.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Wireshark | Wireshark | 1.6.0 (including) | 1.6.0 (including) |
Wireshark | Wireshark | 1.6.1 (including) | 1.6.1 (including) |
Wireshark | Wireshark | 1.6.2 (including) | 1.6.2 (including) |
Wireshark | Wireshark | 1.6.3 (including) | 1.6.3 (including) |
Wireshark | Wireshark | 1.6.4 (including) | 1.6.4 (including) |
Red Hat Enterprise Linux 5 | RedHat | wireshark-0:1.0.15-5.el5 | * |
Red Hat Enterprise Linux 6 | RedHat | wireshark-0:1.2.15-2.el6_2.1 | * |
Wireshark | Ubuntu | hardy | * |
Wireshark | Ubuntu | lucid | * |
Wireshark | Ubuntu | maverick | * |
Wireshark | Ubuntu | natty | * |
Wireshark | Ubuntu | oneiric | * |
Wireshark | Ubuntu | upstream | * |