Thursday, December 2, 2010

Wireshark: Heap-based Buffer-overflow Vulnerability

Users of Wireshark please be advised of a Heap-based buffer overflow vulnerability that has been identified.

To view this vulnerability, possible remedies, and others please check out the Security Advisories at Critical Watch (http://criticalwatch.com/support/security-advisories.aspx)

Amplify’d from www.criticalwatch.com
MDVSA-2010:242: [MDVSA-2010:242] wireshark Buffer-overflow
Problem Description:



This advisory updates wireshark to the latest version (1.2.13),

fixing one security issue:



Heap-based buffer overflow in the dissect_ldss_transfer function

(epan/dissectors/packet-ldss.c) in the LDSS dissector in Wireshark

1.2.0 through 1.2.12 and 1.4.0 through 1.4.1 allows remote attackers

to cause a denial of service (crash) and possibly execute arbitrary

code via an LDSS packet with a long digest line that triggers memory

corruption (CVE-2010-4300).
Read more at www.criticalwatch.com
 

No comments:

Post a Comment