Wireshark contains an unsigned integer wrap vulnerability that may occur when parsing Endace Extensible Record Format (ERF) files.
Wireshark is a protocol analyzer that can open or import previously saved files. When processing an Endace ERF file an unsigned integer wrap vulnerability may cause Wireshark to allocate a very large buffer. To exploit this issue, an attacker would have to convince a user to open a crafted ERF file using Wireshark.
This issue also affects Tshark, the console version of Wireshark.
A remote attacker can cause Wireshark to crash. It may be possible, although unlikely, for an attacker to execute arbitrary code. Exploiting the vulnerability could result in a NULL pointer dereference, which can lead to code execution on certain platforms.
Wireshark 1.2.2 has been released to address this and other issues.
Do not run Wireshark with root or administrator privileges
Running Wireshark with a limited user account will reduce the impact of this and other vulnerabilities.
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Vendor has issued information
__ Sort by: Status Alphabetical
Affected Unknown __ Unaffected
Updated: October 05, 2009
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
Group | Score | Vector
Base | N/A | N/A
Temporal | N/A | N/A
Environmental | | N/A
This issue was discovered by Ryan Giobbi.
This document was written by Ryan Giobbi and Art Manion.
CVE IDs: | None
Severity Metric:** | 1.28
Date Public: | 2009-09-15
Date First Published: | 2009-10-05
Date Last Updated: | 2009-11-25 00:09 UTC
Document Revision: | 27