Multiple integer underflows in Wireshark 1.4.x before 1.4.13 and 1.6.x before 1.6.8 allow remote attackers to cause a denial of service (loop) via vectors related to the R3 dissector, a different vulnerability than CVE-2012-2392.
2012-06-30T10:15:05.187
2025-04-11T00:51:21.963
Deferred
CVSSv2: 3.3 (LOW)
AV:A/AC:L/Au:N/C:N/I:N/A:P
6.5
2.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | wireshark | wireshark | 1.4.0 | Yes |
Application | wireshark | wireshark | 1.4.1 | Yes |
Application | wireshark | wireshark | 1.4.2 | Yes |
Application | wireshark | wireshark | 1.4.3 | Yes |
Application | wireshark | wireshark | 1.4.4 | Yes |
Application | wireshark | wireshark | 1.4.5 | Yes |
Application | wireshark | wireshark | 1.4.6 | Yes |
Application | wireshark | wireshark | 1.4.7 | Yes |
Application | wireshark | wireshark | 1.4.8 | Yes |
Application | wireshark | wireshark | 1.4.9 | Yes |
Application | wireshark | wireshark | 1.4.10 | Yes |
Application | wireshark | wireshark | 1.4.11 | Yes |
Application | wireshark | wireshark | 1.4.12 | Yes |
Application | wireshark | wireshark | 1.4.13 | Yes |
Application | wireshark | wireshark | 1.6.0 | Yes |
Application | wireshark | wireshark | 1.6.1 | Yes |
Application | wireshark | wireshark | 1.6.2 | Yes |
Application | wireshark | wireshark | 1.6.3 | Yes |
Application | wireshark | wireshark | 1.6.4 | Yes |
Application | wireshark | wireshark | 1.6.5 | Yes |
Application | wireshark | wireshark | 1.6.6 | Yes |
Application | wireshark | wireshark | 1.6.7 | Yes |