Input validation error in Wireshark - CVE-2011-1958
Published: June 6, 2011 / Updated: March 24, 2022
Wireshark
Detailed vulnerability description
The vulnerability allows user-assisted remote attackers to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input. A remote attacker can cause a denial of service (NULL pointer dereference and application crash) via a crafted Diameter dictionary file.
How to mitigate CVE-2011-1958
Sources
- http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061290.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061437.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061477.html
- http://openwall.com/lists/oss-security/2011/05/31/20
- http://openwall.com/lists/oss-security/2011/06/01/1
- http://openwall.com/lists/oss-security/2011/06/01/11
- http://rhn.redhat.com/errata/RHSA-2013-0125.html
- http://secunia.com/advisories/44449
- http://secunia.com/advisories/44958
- http://secunia.com/advisories/45149
- http://secunia.com/advisories/48947
- http://www.debian.org/security/2011/dsa-2274
- http://www.securityfocus.com/bid/48066
- http://www.wireshark.org/security/wnpa-sec-2011-07.html
- http://www.wireshark.org/security/wnpa-sec-2011-08.html
- https://bugzilla.redhat.com/show_bug.cgi?id=710184
- https://exchange.xforce.ibmcloud.com/vulnerabilities/67791
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15045