Description
Wireshark 1.2.0 through 1.2.14, 1.4.0 through 1.4.3, and 1.5.0 frees an uninitialized pointer during processing of a .pcap file in the pcap-ng format, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a malformed file.
Exploits (1)
exploitdb
WRITEUP
VERIFIED
by Huzaifa Sidhpurwala · textremotelinux
https://www.exploit-db.com/exploits/35314
References (26)
Core 26
Core References
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/43759
Mailing List, Third Party Advisory vendor-advisory
x_refsource_fedora
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055364.html
Mailing List, Third Party Advisory vendor-advisory
x_refsource_fedora
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055664.html
Third Party Advisory, VDB Entry vdb-entry
signature
x_refsource_oval
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14605
Various Sources x_refsource_confirm
http://www.wireshark.org/docs/relnotes/wireshark-1.2.15.html
Vendor Advisory vdb-entry
x_refsource_vupen
http://www.vupen.com/english/advisories/2011/0747
Vendor Advisory vdb-entry
x_refsource_vupen
http://www.vupen.com/english/advisories/2011/0626
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/43795
US Government Resource third-party-advisory
x_refsource_cert-vn
http://www.kb.cert.org/vuls/id/215900
Patch mailing-list
x_refsource_mlist
http://openwall.com/lists/oss-security/2011/02/04/1
Vendor Advisory vendor-advisory
x_refsource_redhat
http://www.redhat.com/support/errata/RHSA-2011-0370.html
Vendor Advisory vdb-entry
x_refsource_vupen
http://www.vupen.com/english/advisories/2011/0719
Various Sources x_refsource_confirm
http://www.wireshark.org/docs/relnotes/wireshark-1.4.4.html
Mailing List, Third Party Advisory vendor-advisory
x_refsource_fedora
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055650.html
Exploit, Patch x_refsource_confirm
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5652
Various Sources x_refsource_confirm
http://www.wireshark.org/security/wnpa-sec-2011-04.html
Vendor Advisory vdb-entry
x_refsource_vupen
http://www.vupen.com/english/advisories/2011/0622
Various Sources x_refsource_confirm
http://www.wireshark.org/security/wnpa-sec-2011-03.html
Vendor Advisory vendor-advisory
x_refsource_redhat
http://www.redhat.com/support/errata/RHSA-2011-0369.html
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/65182
Vendor Advisory vendor-advisory
x_refsource_mandriva
http://www.mandriva.com/security/advisories?name=MDVSA-2011:044
Third Party Advisory, VDB Entry vdb-entry
x_refsource_sectrack
http://www.securitytracker.com/id?1025148
Issue Tracking x_refsource_confirm
https://bugzilla.redhat.com/show_bug.cgi?id=676232
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/46167
Third Party Advisory vendor-advisory
x_refsource_debian
http://www.debian.org/security/2011/dsa-2201
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/43821
Scores
EPSS
0.2403
EPSS Percentile
96.1%
Details
CWE
CWE-119
Status
published
Products (20)
wireshark/wireshark
1.2.0
wireshark/wireshark
1.2.1
wireshark/wireshark
1.2.2
wireshark/wireshark
1.2.3
wireshark/wireshark
1.2.4
wireshark/wireshark
1.2.5
wireshark/wireshark
1.2.6
wireshark/wireshark
1.2.7
wireshark/wireshark
1.2.8
wireshark/wireshark
1.2.9
... and 10 more
Published
Feb 08, 2011
Tracked Since
Feb 18, 2026