CVE-2011-0538

Wireshark - Memory Corruption

Title source: rule
STIX 2.1

Description

Wireshark 1.2.0 through 1.2.14, 1.4.0 through 1.4.3, and 1.5.0 frees an uninitialized pointer during processing of a .pcap file in the pcap-ng format, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a malformed file.

Exploits (1)

exploitdb WRITEUP VERIFIED
by Huzaifa Sidhpurwala · textremotelinux
https://www.exploit-db.com/exploits/35314

References (26)

Core 26
Core References
Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/43759
Mailing List, Third Party Advisory vendor-advisory x_refsource_fedora
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055364.html
Mailing List, Third Party Advisory vendor-advisory x_refsource_fedora
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055664.html
Third Party Advisory, VDB Entry vdb-entry signature x_refsource_oval
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14605
Vendor Advisory vdb-entry x_refsource_vupen
http://www.vupen.com/english/advisories/2011/0747
Vendor Advisory vdb-entry x_refsource_vupen
http://www.vupen.com/english/advisories/2011/0626
Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/43795
US Government Resource third-party-advisory x_refsource_cert-vn
http://www.kb.cert.org/vuls/id/215900
Patch mailing-list x_refsource_mlist
http://openwall.com/lists/oss-security/2011/02/04/1
Vendor Advisory vendor-advisory x_refsource_redhat
http://www.redhat.com/support/errata/RHSA-2011-0370.html
Vendor Advisory vdb-entry x_refsource_vupen
http://www.vupen.com/english/advisories/2011/0719
Mailing List, Third Party Advisory vendor-advisory x_refsource_fedora
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/055650.html
Various Sources x_refsource_confirm
http://www.wireshark.org/security/wnpa-sec-2011-04.html
Vendor Advisory vdb-entry x_refsource_vupen
http://www.vupen.com/english/advisories/2011/0622
Various Sources x_refsource_confirm
http://www.wireshark.org/security/wnpa-sec-2011-03.html
Vendor Advisory vendor-advisory x_refsource_redhat
http://www.redhat.com/support/errata/RHSA-2011-0369.html
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/65182
Vendor Advisory vendor-advisory x_refsource_mandriva
http://www.mandriva.com/security/advisories?name=MDVSA-2011:044
Third Party Advisory, VDB Entry vdb-entry x_refsource_sectrack
http://www.securitytracker.com/id?1025148
Issue Tracking x_refsource_confirm
https://bugzilla.redhat.com/show_bug.cgi?id=676232
Exploit vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/46167
Third Party Advisory vendor-advisory x_refsource_debian
http://www.debian.org/security/2011/dsa-2201
Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/43821

Scores

EPSS 0.2403
EPSS Percentile 96.1%

Details

CWE
CWE-119
Status published
Products (20)
wireshark/wireshark 1.2.0
wireshark/wireshark 1.2.1
wireshark/wireshark 1.2.2
wireshark/wireshark 1.2.3
wireshark/wireshark 1.2.4
wireshark/wireshark 1.2.5
wireshark/wireshark 1.2.6
wireshark/wireshark 1.2.7
wireshark/wireshark 1.2.8
wireshark/wireshark 1.2.9
... and 10 more
Published Feb 08, 2011
Tracked Since Feb 18, 2026