Vulnerability Details : CVE-2011-1956
The bytes_repr_len function in Wireshark 1.4.5 uses an incorrect pointer argument, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via arbitrary TCP traffic.
Vulnerability category: Memory CorruptionDenial of service
Products affected by CVE-2011-1956
- cpe:2.3:a:wireshark:wireshark:1.4.5:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2011-1956
1.02%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 84 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2011-1956
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:N/I:N/A:P |
8.6
|
2.9
|
NIST |
References for CVE-2011-1956
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/67789
Wireshark desegment_tcp() denial of service CVE-2011-1956 Vulnerability Report
-
http://openwall.com/lists/oss-security/2011/06/01/9
oss-security - Re: CVE request for Wireshark 1.4.5 TCP DoS issueExploit
-
http://openwall.com/lists/oss-security/2011/05/31/19
oss-security - CVE request for Wireshark 1.4.5 TCP DoS issueExploit
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14943
Repository / Oval Repository
-
http://www.wireshark.org/docs/relnotes/wireshark-1.4.6.html
Wireshark · Wireshark 1.4.6 Release NotesPatch
-
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5837
5837 – Wireshark (and tshark) crashes on tcp traffic - dissector accessed an invalid memory addressExploit
-
http://www.wireshark.org/news/20110418.html
Wireshark · Wireshark 1.4.6 ReleasedPatch
Jump to