Stack-based buffer overflow in Wireshark - CVE-2011-1959
Published: June 6, 2011 / Updated: March 24, 2022
Wireshark
Detailed vulnerability description
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error within the snoop_read function in wiretap/snoop.c when processing a large length value in a snoop file that triggers a stack-based buffer over-read. A remote unauthenticated attacker can trigger stack-based buffer overflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
How to mitigate CVE-2011-1959
Sources
- http://anonsvn.wireshark.org/viewvc?view=revision&revision=37068
- http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061290.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061437.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061477.html
- http://openwall.com/lists/oss-security/2011/05/31/20
- http://openwall.com/lists/oss-security/2011/06/01/1
- http://openwall.com/lists/oss-security/2011/06/01/11
- http://rhn.redhat.com/errata/RHSA-2013-0125.html
- http://secunia.com/advisories/44449
- http://secunia.com/advisories/44958
- http://secunia.com/advisories/45149
- http://secunia.com/advisories/48947
- http://www.debian.org/security/2011/dsa-2274
- http://www.securityfocus.com/bid/48066
- http://www.wireshark.org/security/wnpa-sec-2011-07.html
- http://www.wireshark.org/security/wnpa-sec-2011-08.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5912
- https://bugzilla.redhat.com/show_bug.cgi?id=710039
- https://exchange.xforce.ibmcloud.com/vulnerabilities/67792
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14656