Wireshark 1.4.x before 1.4.11 and 1.6.x before 1.6.5 does not properly perform certain string conversions, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted packet, related to epan/to_str.c.
2012-04-11T10:39:25.700
2025-04-11T00:51:21.963
Deferred
CVSSv2: 2.9 (LOW)
AV:A/AC:M/Au:N/C:N/I:N/A:P
5.5
2.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | wireshark | wireshark | 1.6.0 | Yes |
Application | wireshark | wireshark | 1.6.1 | Yes |
Application | wireshark | wireshark | 1.6.2 | Yes |
Application | wireshark | wireshark | 1.6.3 | Yes |
Application | wireshark | wireshark | 1.6.4 | Yes |
Operating System | redhat | enterprise_linux | 5 | Yes |
Application | wireshark | wireshark | 1.4.0 | Yes |
Application | wireshark | wireshark | 1.4.1 | Yes |
Application | wireshark | wireshark | 1.4.2 | Yes |
Application | wireshark | wireshark | 1.4.3 | Yes |
Application | wireshark | wireshark | 1.4.4 | Yes |
Application | wireshark | wireshark | 1.4.5 | Yes |
Application | wireshark | wireshark | 1.4.6 | Yes |
Application | wireshark | wireshark | 1.4.7 | Yes |
Application | wireshark | wireshark | 1.4.8 | Yes |
Application | wireshark | wireshark | 1.4.9 | Yes |
Application | wireshark | wireshark | 1.4.10 | Yes |