CVE-2012-2393 (GCVE-0-2012-2393)

Vulnerability from cvelistv5 – Published: 2012-06-30 10:00 – Updated: 2024-08-06 19:34
VLAI?
Summary
epan/dissectors/packet-diameter.c in the DIAMETER dissector in Wireshark 1.4.x before 1.4.13 and 1.6.x before 1.6.8 does not properly construct certain array data structures, which allows remote attackers to cause a denial of service (application crash) via a crafted packet that triggers incorrect memory allocation.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T19:34:25.469Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "MDVSA-2012:015",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:015"
          },
          {
            "name": "1027094",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1027094"
          },
          {
            "name": "MDVSA-2012:042",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:042"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=42200"
          },
          {
            "name": "53652",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/53652"
          },
          {
            "name": "oval:org.mitre.oval:def:15558",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15558"
          },
          {
            "name": "49226",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/49226"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7138"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.wireshark.org/security/wnpa-sec-2012-09.html"
          },
          {
            "name": "MDVSA-2012:080",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:080"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-diameter.c?r1=42200\u0026r2=42199\u0026pathrev=42200"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-05-21T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "epan/dissectors/packet-diameter.c in the DIAMETER dissector in Wireshark 1.4.x before 1.4.13 and 1.6.x before 1.6.8 does not properly construct certain array data structures, which allows remote attackers to cause a denial of service (application crash) via a crafted packet that triggers incorrect memory allocation."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-18T12:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "MDVSA-2012:015",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:015"
        },
        {
          "name": "1027094",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1027094"
        },
        {
          "name": "MDVSA-2012:042",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:042"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=42200"
        },
        {
          "name": "53652",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/53652"
        },
        {
          "name": "oval:org.mitre.oval:def:15558",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15558"
        },
        {
          "name": "49226",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/49226"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7138"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.wireshark.org/security/wnpa-sec-2012-09.html"
        },
        {
          "name": "MDVSA-2012:080",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:080"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-diameter.c?r1=42200\u0026r2=42199\u0026pathrev=42200"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2012-2393",
    "datePublished": "2012-06-30T10:00:00",
    "dateReserved": "2012-04-19T00:00:00",
    "dateUpdated": "2024-08-06T19:34:25.469Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wireshark:wireshark:1.4.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ABB6F1D5-64CC-474D-B123-818080ED7903\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wireshark:wireshark:1.4.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A5E0F58D-4CE5-4051-A0F6-9BFA2FC0D2DB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wireshark:wireshark:1.4.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1CC3D171-73D0-4A14-A2AA-60C9739CD840\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wireshark:wireshark:1.4.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CF840746-1797-4ACC-8AFD-8FBD97E9F706\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wireshark:wireshark:1.4.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"87AA0CD8-5F45-4F3C-B72E-6D94EA4B2C8B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wireshark:wireshark:1.4.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7E96B426-8563-4BC2-909A-72457D7159FF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wireshark:wireshark:1.4.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"452E7B6C-88FF-4402-92A2-D417928C3A7F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wireshark:wireshark:1.4.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9049C8A8-BC0A-4D0E-BAFE-9D798C61DE5C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wireshark:wireshark:1.4.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A2F262A5-9475-4F36-920C-E98099F0190A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wireshark:wireshark:1.4.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"57B487D4-4AD7-4BE7-86AB-134EEC8D05FA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wireshark:wireshark:1.4.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FBFA1229-1497-4C9E-8CCA-CEBA34F446AE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wireshark:wireshark:1.4.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"65A8CA23-46BC-4AAB-8FB7-D7C3DEA9411E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wireshark:wireshark:1.4.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"484B7C8C-D3DC-4300-973A-2D6E523A9EBF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wireshark:wireshark:1.4.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"88B01D23-76DD-42FC-B5D6-34B59DC610B7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wireshark:wireshark:1.6.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0738C9A6-0370-447D-91E6-EB59ECC92224\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wireshark:wireshark:1.6.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"05A83A69-D49D-48D0-8FFE-4887F15ACD33\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wireshark:wireshark:1.6.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B9CA0830-9AFE-499F-903F-D9C3B5CCC982\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wireshark:wireshark:1.6.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"178B042E-A628-4C40-BEDB-80200252D301\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wireshark:wireshark:1.6.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D72AEB47-B059-4DF4-9414-E8EE0024997B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wireshark:wireshark:1.6.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"12CBB602-DE4E-4096-BB3C-ED2A68833050\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wireshark:wireshark:1.6.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"25C336D3-F7C5-40E0-B740-831D2120E1DC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:wireshark:wireshark:1.6.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"76207D59-2426-48E6-A5AA-24CB481AF05F\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"epan/dissectors/packet-diameter.c in the DIAMETER dissector in Wireshark 1.4.x before 1.4.13 and 1.6.x before 1.6.8 does not properly construct certain array data structures, which allows remote attackers to cause a denial of service (application crash) via a crafted packet that triggers incorrect memory allocation.\"}, {\"lang\": \"es\", \"value\": \"epan/dissectors/packet-diameter.c del analizador DIAMETER de Wireshark 1.4.x anteriores a 1.4.13 y 1.6.x anteriores a 1.6.8 no construye adecuadamente determinadas estructuras de datos de array, lo que permite a atacantes remotos provocar una denegaci\\u00f3n de servicio (ca\\u00edda de la aplicaci\\u00f3n) a trav\\u00e9s de un paquete modificado que provoca una alineaci\\u00f3n en memoria incorrecta.\"}]",
      "id": "CVE-2012-2393",
      "lastModified": "2024-11-21T01:39:00.517",
      "metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:A/AC:L/Au:N/C:N/I:N/A:P\", \"baseScore\": 3.3, \"accessVector\": \"ADJACENT_NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"LOW\", \"exploitabilityScore\": 6.5, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
      "published": "2012-06-30T10:15:05.060",
      "references": "[{\"url\": \"http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-diameter.c?r1=42200\u0026r2=42199\u0026pathrev=42200\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Patch\"]}, {\"url\": \"http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=42200\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/49226\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.mandriva.com/security/advisories?name=MDVSA-2012:015\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.mandriva.com/security/advisories?name=MDVSA-2012:042\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.mandriva.com/security/advisories?name=MDVSA-2012:080\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.securityfocus.com/bid/53652\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.securitytracker.com/id?1027094\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.wireshark.org/security/wnpa-sec-2012-09.html\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7138\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15558\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-diameter.c?r1=42200\u0026r2=42199\u0026pathrev=42200\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=42200\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/49226\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.mandriva.com/security/advisories?name=MDVSA-2012:015\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.mandriva.com/security/advisories?name=MDVSA-2012:042\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.mandriva.com/security/advisories?name=MDVSA-2012:080\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/bid/53652\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securitytracker.com/id?1027094\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.wireshark.org/security/wnpa-sec-2012-09.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7138\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15558\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
      "sourceIdentifier": "secalert@redhat.com",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-119\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2012-2393\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2012-06-30T10:15:05.060\",\"lastModified\":\"2025-04-11T00:51:21.963\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"epan/dissectors/packet-diameter.c in the DIAMETER dissector in Wireshark 1.4.x before 1.4.13 and 1.6.x before 1.6.8 does not properly construct certain array data structures, which allows remote attackers to cause a denial of service (application crash) via a crafted packet that triggers incorrect memory allocation.\"},{\"lang\":\"es\",\"value\":\"epan/dissectors/packet-diameter.c del analizador DIAMETER de Wireshark 1.4.x anteriores a 1.4.13 y 1.6.x anteriores a 1.6.8 no construye adecuadamente determinadas estructuras de datos de array, lo que permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda de la aplicaci\u00f3n) a trav\u00e9s de un paquete modificado que provoca una alineaci\u00f3n en memoria incorrecta.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:A/AC:L/Au:N/C:N/I:N/A:P\",\"baseScore\":3.3,\"accessVector\":\"ADJACENT_NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":6.5,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wireshark:wireshark:1.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ABB6F1D5-64CC-474D-B123-818080ED7903\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wireshark:wireshark:1.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5E0F58D-4CE5-4051-A0F6-9BFA2FC0D2DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wireshark:wireshark:1.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1CC3D171-73D0-4A14-A2AA-60C9739CD840\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wireshark:wireshark:1.4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF840746-1797-4ACC-8AFD-8FBD97E9F706\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wireshark:wireshark:1.4.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"87AA0CD8-5F45-4F3C-B72E-6D94EA4B2C8B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wireshark:wireshark:1.4.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E96B426-8563-4BC2-909A-72457D7159FF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wireshark:wireshark:1.4.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"452E7B6C-88FF-4402-92A2-D417928C3A7F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wireshark:wireshark:1.4.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9049C8A8-BC0A-4D0E-BAFE-9D798C61DE5C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wireshark:wireshark:1.4.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2F262A5-9475-4F36-920C-E98099F0190A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wireshark:wireshark:1.4.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"57B487D4-4AD7-4BE7-86AB-134EEC8D05FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wireshark:wireshark:1.4.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FBFA1229-1497-4C9E-8CCA-CEBA34F446AE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wireshark:wireshark:1.4.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"65A8CA23-46BC-4AAB-8FB7-D7C3DEA9411E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wireshark:wireshark:1.4.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"484B7C8C-D3DC-4300-973A-2D6E523A9EBF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wireshark:wireshark:1.4.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"88B01D23-76DD-42FC-B5D6-34B59DC610B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wireshark:wireshark:1.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0738C9A6-0370-447D-91E6-EB59ECC92224\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wireshark:wireshark:1.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"05A83A69-D49D-48D0-8FFE-4887F15ACD33\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wireshark:wireshark:1.6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B9CA0830-9AFE-499F-903F-D9C3B5CCC982\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wireshark:wireshark:1.6.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"178B042E-A628-4C40-BEDB-80200252D301\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wireshark:wireshark:1.6.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D72AEB47-B059-4DF4-9414-E8EE0024997B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wireshark:wireshark:1.6.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"12CBB602-DE4E-4096-BB3C-ED2A68833050\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wireshark:wireshark:1.6.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25C336D3-F7C5-40E0-B740-831D2120E1DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:wireshark:wireshark:1.6.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"76207D59-2426-48E6-A5AA-24CB481AF05F\"}]}]}],\"references\":[{\"url\":\"http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-diameter.c?r1=42200\u0026r2=42199\u0026pathrev=42200\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\"]},{\"url\":\"http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=42200\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/49226\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2012:015\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2012:042\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2012:080\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/bid/53652\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securitytracker.com/id?1027094\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.wireshark.org/security/wnpa-sec-2012-09.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7138\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15558\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-diameter.c?r1=42200\u0026r2=42199\u0026pathrev=42200\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=42200\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/49226\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2012:015\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2012:042\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2012:080\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/53652\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securitytracker.com/id?1027094\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.wireshark.org/security/wnpa-sec-2012-09.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7138\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15558\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…