CVE Vulnerabilities

CVE-2012-6054

Published: Dec 05, 2012 | Modified: Apr 11, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
5 MEDIUM
AV:N/AC:L/Au:N/C:N/I:N/A:P
RedHat/V2
4.3 LOW
AV:N/AC:M/Au:N/C:N/I:N/A:P
RedHat/V3
Ubuntu
LOW
root.io logo minimus.io logo echo.ai logo

The dissect_sflow_245_address_type function in epan/dissectors/packet-sflow.c in the sFlow dissector in Wireshark 1.8.x before 1.8.4 does not properly handle length calculations for an invalid IP address type, which allows remote attackers to cause a denial of service (infinite loop) via a packet that is neither IPv4 nor IPv6.

Affected Software

NameVendorStart VersionEnd Version
WiresharkWireshark1.8.0 (including)1.8.0 (including)
WiresharkWireshark1.8.1 (including)1.8.1 (including)
WiresharkWireshark1.8.2 (including)1.8.2 (including)
WiresharkWireshark1.8.3 (including)1.8.3 (including)
WiresharkUbuntuhardy*
WiresharkUbuntulucid*
WiresharkUbuntuoneiric*
WiresharkUbuntuprecise*
WiresharkUbuntuquantal*
WiresharkUbunturaring*
WiresharkUbuntusaucy*
WiresharkUbuntuupstream*

References