Vulnerability Details : CVE-2012-4048
The PPP dissector in Wireshark 1.4.x before 1.4.14, 1.6.x before 1.6.9, and 1.8.x before 1.8.1 allows remote attackers to cause a denial of service (invalid pointer dereference and application crash) via a crafted packet, as demonstrated by a usbmon dump.
Vulnerability category: Denial of service
Products affected by CVE-2012-4048
- cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.4.0:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.4.2:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.4.3:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.4.4:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.4.5:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.4.6:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.4.7:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.6.0:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.6.1:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.4.8:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.6.2:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.4.9:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.4.10:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.6.3:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.6.4:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.4.11:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.6.5:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.4.12:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.4.13:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.6.6:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.6.7:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.4.0:*:*:*:*:*:itanium:*
- cpe:2.3:a:wireshark:wireshark:1.4.1:*:*:*:*:*:sparc:*
- cpe:2.3:a:wireshark:wireshark:1.4.4:*:*:*:*:*:itanium:*
- cpe:2.3:a:wireshark:wireshark:1.4.5:*:*:*:*:*:sparc:*
- cpe:2.3:a:wireshark:wireshark:1.4.8:*:*:*:*:*:itanium:*
- cpe:2.3:a:wireshark:wireshark:1.4.9:*:*:*:*:*:sparc:*
- cpe:2.3:a:wireshark:wireshark:1.4.12:*:*:*:*:*:itanium:*
- cpe:2.3:a:wireshark:wireshark:1.4.12:*:*:*:*:*:sparc:*
- cpe:2.3:a:wireshark:wireshark:1.6.3:*:*:*:*:*:sparc:*
- cpe:2.3:a:wireshark:wireshark:1.6.3:*:*:*:*:*:itanium:*
- cpe:2.3:a:wireshark:wireshark:1.6.7:*:*:*:*:*:sparc:*
- cpe:2.3:a:wireshark:wireshark:1.6.7:*:*:*:*:*:itanium:*
- cpe:2.3:a:wireshark:wireshark:1.4.0:*:*:*:*:*:sparc:*
- cpe:2.3:a:wireshark:wireshark:1.4.3:*:*:*:*:*:itanium:*
- cpe:2.3:a:wireshark:wireshark:1.4.4:*:*:*:*:*:sparc:*
- cpe:2.3:a:wireshark:wireshark:1.4.7:*:*:*:*:*:itanium:*
- cpe:2.3:a:wireshark:wireshark:1.4.8:*:*:*:*:*:sparc:*
- cpe:2.3:a:wireshark:wireshark:1.4.13:*:*:*:*:*:sparc:*
- cpe:2.3:a:wireshark:wireshark:1.4.13:*:*:*:*:*:itanium:*
- cpe:2.3:a:wireshark:wireshark:1.6.2:*:*:*:*:*:sparc:*
- cpe:2.3:a:wireshark:wireshark:1.6.2:*:*:*:*:*:itanium:*
- cpe:2.3:a:wireshark:wireshark:1.6.6:*:*:*:*:*:sparc:*
- cpe:2.3:a:wireshark:wireshark:1.6.6:*:*:*:*:*:itanium:*
- cpe:2.3:a:wireshark:wireshark:1.4.2:*:*:*:*:*:itanium:*
- cpe:2.3:a:wireshark:wireshark:1.4.3:*:*:*:*:*:sparc:*
- cpe:2.3:a:wireshark:wireshark:1.4.6:*:*:*:*:*:itanium:*
- cpe:2.3:a:wireshark:wireshark:1.4.7:*:*:*:*:*:sparc:*
- cpe:2.3:a:wireshark:wireshark:1.4.10:*:*:*:*:*:itanium:*
- cpe:2.3:a:wireshark:wireshark:1.4.11:*:*:*:*:*:sparc:*
- cpe:2.3:a:wireshark:wireshark:1.4.11:*:*:*:*:*:itanium:*
- cpe:2.3:a:wireshark:wireshark:1.6.1:*:*:*:*:*:sparc:*
- cpe:2.3:a:wireshark:wireshark:1.6.1:*:*:*:*:*:itanium:*
- cpe:2.3:a:wireshark:wireshark:1.6.5:*:*:*:*:*:sparc:*
- cpe:2.3:a:wireshark:wireshark:1.6.5:*:*:*:*:*:itanium:*
- cpe:2.3:a:wireshark:wireshark:1.4.1:*:*:*:*:*:itanium:*
- cpe:2.3:a:wireshark:wireshark:1.4.2:*:*:*:*:*:sparc:*
- cpe:2.3:a:wireshark:wireshark:1.4.5:*:*:*:*:*:itanium:*
- cpe:2.3:a:wireshark:wireshark:1.4.6:*:*:*:*:*:sparc:*
- cpe:2.3:a:wireshark:wireshark:1.4.9:*:*:*:*:*:itanium:*
- cpe:2.3:a:wireshark:wireshark:1.4.10:*:*:*:*:*:sparc:*
- cpe:2.3:a:wireshark:wireshark:1.6.0:*:*:*:*:*:sparc:*
- cpe:2.3:a:wireshark:wireshark:1.6.0:*:*:*:*:*:itanium:*
- cpe:2.3:a:wireshark:wireshark:1.6.4:*:*:*:*:*:sparc:*
- cpe:2.3:a:wireshark:wireshark:1.6.4:*:*:*:*:*:itanium:*
- cpe:2.3:a:wireshark:wireshark:1.6.8:*:*:*:*:*:sparc:*
- cpe:2.3:a:wireshark:wireshark:1.6.8:*:*:*:*:*:itanium:*
- cpe:2.3:a:wireshark:wireshark:1.8.0:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.6.8:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.8.0:*:*:*:*:*:itanium:*
- cpe:2.3:a:wireshark:wireshark:1.8.0:*:*:*:*:*:sparc:*
Exploit prediction scoring system (EPSS) score for CVE-2012-4048
0.26%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 65 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2012-4048
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
3.3
|
LOW | AV:A/AC:L/Au:N/C:N/I:N/A:P |
6.5
|
2.9
|
NIST |
CWE ids for CVE-2012-4048
-
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.Assigned by: nvd@nist.gov (Primary)
References for CVE-2012-4048
-
http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml
Wireshark: Multiple vulnerabilities (GLSA 201308-05) — Gentoo security
-
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=680056
#680056 - wireshark: CVE-2012-4048: PPP dissector crash/segfault - Debian Bug report logs
-
http://lists.opensuse.org/opensuse-updates/2012-08/msg00000.html
openSUSE-SU-2012:0930-1: moderate: wireshark (CVE-2012-4048, CVE-2012-40
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15547
Repository / Oval Repository
-
http://www.debian.org/security/2012/dsa-2590
Debian -- Security Information -- DSA-2590-1 wireshark
-
http://www.wireshark.org/security/wnpa-sec-2012-11.html
Wireshark · wnpa-sec-2012-11 · PPP dissector crashVendor Advisory
Jump to