CVE-2010-4538 Wireshark: Stack-based array index error in ENTTEC dissector
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
wireshark (Ubuntu) |
Fix Released
|
Medium
|
Unassigned | ||
Lucid |
Won't Fix
|
Undecided
|
Unassigned | ||
Maverick |
Fix Released
|
Undecided
|
Unassigned | ||
Natty |
Fix Released
|
Medium
|
Unassigned |
Bug Description
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
affects ubuntu/wireshark
status inprogress
assignee udienz
importance medium
security yes
done
Common Vulnerabilities and Exposures assigned an identifier
CVE-2010-4538 to the following vulnerability:
Name: CVE-2010-4538
URL: http://
Reference:
# MLIST:[
# URL:http://
# MLIST:[
# URL:http://
# CONFIRM:https:/
# DEBIAN:DSA-2144
# URL:http://
# FEDORA:
#
URL:http://
# FEDORA:
#
URL:http://
# MANDRIVA:
# URL:http://
Buffer overflow in the sect_enttec_dmx_da function in
epan/dissectors
attackers to cause a denial of service (application crash) or possibly
execute arbitrary code via a crafted ENTTEC DMX packet with Run Length
Encoding (RLE) compression.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://
iF4EAREIAAYFAk1
IC+UtXP428qsVSd
=5fYc
-----END PGP SIGNATURE-----
CVE References
visibility: | private → public |
This was fixed in 1.4.4-1