Vulnerability Details : CVE-2012-4294
Potential exploit
Buffer overflow in the channelised_fill_sdh_g707_format function in epan/dissectors/packet-erf.c in the ERF dissector in Wireshark 1.8.x before 1.8.2 allows remote attackers to execute arbitrary code via a large speed (aka rate) value.
Vulnerability category: OverflowExecute code
Products affected by CVE-2012-4294
- cpe:2.3:o:sun:sunos:5.11:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.8.0:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.8.1:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2012-4294
2.54%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 84 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2012-4294
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.8
|
MEDIUM | AV:A/AC:L/Au:N/C:P/I:P/A:P |
6.5
|
6.4
|
NIST |
CWE ids for CVE-2012-4294
-
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.Assigned by: nvd@nist.gov (Primary)
References for CVE-2012-4294
-
http://www.securityfocus.com/bid/55035
Wireshark Versions Prior to 1.8.2 Multiple Security Vulnerabilities
-
http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml
Wireshark: Multiple vulnerabilities (GLSA 201308-05) — Gentoo security
-
http://anonsvn.wireshark.org/viewvc?view=revision&revision=44377
code.wireshark Code Review - wireshark.git/tree
-
http://www.wireshark.org/security/wnpa-sec-2012-16.html
Wireshark · wnpa-sec-2012-16 · Wireshark ERF dissector flawsVendor Advisory
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15673
Repository / Oval Repository
-
https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_wireshark3
Multiple vulnerabilities in Wireshark | Oracle Third Party Vulnerability Resolution Blog
-
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7563
7563 – Capture file that crashes wireshark
-
http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-erf.c?r1=44377&r2=44376&pathrev=44377
code.wireshark Code Review - wireshark.git/treeExploit;Patch
-
https://hermes.opensuse.org/messages/15514562
openSUSE.org - 503
Jump to