CVE-2011-1956
Wireshark 1.4.5 - 'bytes_repr_len()' Null Pointer Dereference Denial of Service
Severity Score
4.3
*CVSS v2
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
4
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
The bytes_repr_len function in Wireshark 1.4.5 uses an incorrect pointer argument, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via arbitrary TCP traffic.
Función bytes_repr_len en Wireshark v1.4.5 utiliza un argumento de puntero incorrecto, lo que permite a atacantes remotos provocar una denegación de servicio ( desreferenciar punteros nulos y bloqueo de la aplicación ) a través tráfico TCP arbitrario.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2011-05-09 CVE Reserved
- 2011-06-06 CVE Published
- 2011-06-17 First Exploit
- 2024-08-06 CVE Updated
- 2024-09-19 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
CAPEC
References (9)
URL | Tag | Source |
---|---|---|
http://secunia.com/advisories/44449 | Third Party Advisory | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/67789 | Vdb Entry | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14943 | Signature |
URL | Date | SRC |
---|---|---|
https://www.exploit-db.com/exploits/35873 | 2011-06-17 | |
http://openwall.com/lists/oss-security/2011/05/31/19 | 2024-08-06 | |
http://openwall.com/lists/oss-security/2011/06/01/9 | 2024-08-06 | |
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5837 | 2024-08-06 |
URL | Date | SRC |
---|---|---|
http://www.wireshark.org/docs/relnotes/wireshark-1.4.6.html | 2017-09-19 | |
http://www.wireshark.org/news/20110418.html | 2017-09-19 |
URL | Date | SRC |
---|