CVE-2011-0713 Wireshark: heap-based buffer overflow when reading malformed Nokia DCT3 phone signalling traces
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
wireshark (Ubuntu) |
Fix Released
|
Medium
|
Unassigned | ||
Karmic |
Won't Fix
|
Medium
|
Unassigned | ||
Lucid |
Won't Fix
|
Medium
|
Unassigned | ||
Maverick |
Won't Fix
|
Medium
|
Unassigned |
Bug Description
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
affects ubuntu/wireshark
status inprogress
assignee udienz
importance medium
security yes
private yes
done
Common Vulnerabilities and Exposures assigned an identifier CVE-2011-0713 to
the following vulnerability:
Name: CVE-2011-0713
URL: http://
Assigned: 20110302
Reference:
* MLIST:[
* URL:http://
* CONFIRM:http://
* CONFIRM:http://
* CONFIRM:http://
* CONFIRM:http://
* CONFIRM:http://
* CONFIRM:https:/
* BID:46416
* URL:http://
* XF:wireshark-
* URL:http://
Heap-based buffer overflow in wiretap/dct3trace.c in Wireshark 1.2.0
through 1.2.14 and 1.4.0 through 1.4.3 allows remote attackers to cause
a denial of service (application crash) or possibly have unspecified
other impact via a long record in a Nokia DCT3 trace file.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://
iF4EAREIAAYFAk1
NuCbNMMMUSXM04W
=+31r
-----END PGP SIGNATURE-----
CVE References
visibility: | private → public |
Fixed in Natty with 1.4.4-1