Vulnerability Details : CVE-2011-1143
epan/dissectors/packet-ntlmssp.c in the NTLMSSP dissector in Wireshark before 1.4.4 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted .pcap file.
Vulnerability category: Memory CorruptionDenial of service
Exploit prediction scoring system (EPSS) score for CVE-2011-1143
Probability of exploitation activity in the next 30 days: 0.88%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 80 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2011-1143
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Source |
---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:N/I:N/A:P |
8.6
|
2.9
|
[email protected] |
References for CVE-2011-1143
- http://www.securitytracker.com/id?1025148
- http://www.vupen.com/english/advisories/2011/0719
-
http://www.kb.cert.org/vuls/id/215900
US Government Resource
- http://www.wireshark.org/docs/relnotes/wireshark-1.4.4.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055664.html
-
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5157
-
http://www.securityfocus.com/bid/46796
- http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055364.html
- http://www.redhat.com/support/errata/RHSA-2011-0370.html
- https://hermes.opensuse.org/messages/8086844
-
http://anonsvn.wireshark.org/viewvc?view=rev&revision=34018
Patch
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16209
- http://www.vupen.com/english/advisories/2011/0626
- http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055650.html
Products affected by CVE-2011-1143
- cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:0.99.2:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:0.99.3:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:0.99.4:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:0.99.5:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:0.99.6:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:0.99.7:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:0.99.8:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.0.7:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.0.8:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.0.9:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.2:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.2.3:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.2.4:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.2.5:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.0.10:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.0.11:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.0.12:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.2.7:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.2.6:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.0.13:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.2.8:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.2.9:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.0.14:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.2.11:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.4.0:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.2.10:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.2.12:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.4.2:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.0.15:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.2.13:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.2.14:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.0.16:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.2.15:*:*:*:*:*:*:*