ID CVE-2011-1956
Summary The bytes_repr_len function in Wireshark 1.4.5 uses an incorrect pointer argument, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via arbitrary TCP traffic.
References
Vulnerable Configurations
  • Wireshark 1.4.5
    cpe:2.3:a:wireshark:wireshark:1.4.5
CVSS
Base: 4.3 (as of 07-06-2011 - 11:26)
Impact:
Exploitability:
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
exploit-db via4
description Wireshark 1.4.5 'bytes_repr_len()' NULL Pointer Dereference Denial Of Service Vulnerability. CVE-2011-1956. Dos exploit for windows platform
id EDB-ID:35873
last seen 2016-02-04
modified 2011-06-17
published 2011-06-17
reporter rouli
source https://www.exploit-db.com/download/35873/
title Wireshark 1.4.5 - 'bytes_repr_len' NULL Pointer Dereference Denial Of Service Vulnerability
nessus via4
  • NASL family Windows
    NASL id WIRESHARK_1_4_6.NASL
    description The installed version of Wireshark, version 1.4.5, is affected by a denial of service vulnerability. An attacker can exploit this vulnerability by crafting a malicious TCP packet and sending it on a network segment that Wireshark is monitoring, causing the application to crash.
    last seen 2019-02-21
    modified 2018-08-06
    plugin id 55411
    published 2011-06-23
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=55411
    title Wireshark 1.4.5 Denial of Service
  • NASL family Gentoo Local Security Checks
    NASL id GENTOO_GLSA-201110-02.NASL
    description The remote host is affected by the vulnerability described in GLSA-201110-02 (Wireshark: Multiple vulnerabilities) Multiple vulnerabilities have been discovered in Wireshark. Please review the CVE identifiers referenced below for details. Impact : A remote attacker could send specially crafted packets on a network being monitored by Wireshark, entice a user to open a malformed packet trace file using Wireshark, or deploy a specially crafted Lua script for use by Wireshark, possibly resulting in the execution of arbitrary code, or a Denial of Service condition. Workaround : There is no known workaround at this time.
    last seen 2019-02-21
    modified 2018-07-11
    plugin id 56426
    published 2011-10-10
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=56426
    title GLSA-201110-02 : Wireshark: Multiple vulnerabilities
  • NASL family Windows
    NASL id WIRESHARK_1_4_7.NASL
    description The installed version of Wireshark is 1.2.x less than 1.2.17 or 1.4.x less than 1.4.7. As such, it is affected by the following vulnerabilities : - An error exists in DICOM dissector that can allow denial of service attacks when processing certain malformed packets. (Issue #5876) - An error exists in the handling of corrupted snoop files that can cause application crashes. (Issue #5912) - An error exists in the handling of compressed capture data that can cause application crashes. (Issue #5908) - An error exists in the handling of 'Visual Networks' files that can cause application crashes. (Issue #5934) - An error exists in the 'desegment_tcp()' function in the file 'epan/dissectors/packet-tcp.c' that can allow a NULL pointer to be dereferenced when handling certain TCP segments. (Issue #5837) - An error exists in the handling of corrupted 'Diameter' dictionary files that can cause application crashes. (CVE-2011-1958)
    last seen 2019-02-21
    modified 2018-11-15
    plugin id 54942
    published 2011-06-02
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=54942
    title Wireshark < 1.2.17 / 1.4.7 Multiple DoS Vulnerabilities
oval via4
accepted 2013-08-19T04:00:45.120-04:00
class vulnerability
contributors
  • name Shane Shaffer
    organization G2, Inc.
  • name Shane Shaffer
    organization G2, Inc.
  • name Shane Shaffer
    organization G2, Inc.
definition_extensions
comment Wireshark is installed on the system.
oval oval:org.mitre.oval:def:6589
description The bytes_repr_len function in Wireshark 1.4.5 uses an incorrect pointer argument, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via arbitrary TCP traffic.
family windows
id oval:org.mitre.oval:def:14943
status accepted
submitted 2012-02-27T15:34:33.178-04:00
title Vulnerability in bytes_repr_len function in Wireshark 1.4.5
version 8
refmap via4
confirm
mlist
  • [oss-security] 20110531 CVE request for Wireshark 1.4.5 TCP DoS issue
  • [oss-security] 20110601 Re: CVE request for Wireshark 1.4.5 TCP DoS issue
secunia 44449
xf wireshark-desegmenttcp-dos(67789)
Last major update 13-08-2012 - 23:27
Published 06-06-2011 - 15:55
Last modified 18-09-2017 - 21:32
Back to Top