wireshark
Page content
- Author: Miklos Vajna
- Vulnerable: 1.2.2-1getorin1
- Unaffected: 1.2.3-1getorin1
Some vulnerabilities have been reported in Wireshark, which can be exploited by malicious people to cause a DoS (Denial of Service).
- An alignment error within the “dissect_paltalk()” function in epan/dissectors/packet-paltalk.c of the Paltalk dissector can be exploited to cause a crash. Note: Successful exploitation requires that Wireshark is running on an alignment sensitive architecture.
- A NULL pointer dereference error within the DCERPC/NT dissector when can be exploited to cause a crash.
- An off-by-one error within the “dissect_negprot_response()” function in epan/dissectors/packet-smb.c of the SMB dissector can be exploited to cause a crash.
- An error within the RADIUS dissector can be exploited to cause a crash.
- Bug Tracker URL: http://bugs.frugalware.org/task/4026