8.3 High
CVSS2
Access Vector
ADJACENT_NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:A/AC:L/Au:N/C:C/I:C/A:C
0.07 Low
EPSS
Percentile
93.9%
Wireshark reports:
It may be possible to make Wireshark crash by injecting a
malformed packet onto the wire or by convincing someone to read a
malformed packet trace file.
It may be possible to make Wireshark consume excessive CPU
resources by injecting a malformed packet onto the wire or by
convincing someone to read a malformed packet trace file.
The PPP dissector could crash.
The NFS dissector could use excessive amounts of CPU.
The DCP ETSI dissector could trigger a zero division.
The MongoDB dissector could go into a large loop.
The XTP dissector could go into an infinite loop.
The ERF dissector could overflow a buffer.
The AFP dissector could go into a large loop.
The RTPS2 dissector could overflow a buffer.
The GSM RLC MAC dissector could overflow a buffer.
The CIP dissector could exhaust system memory.
The STUN dissector could crash.
The EtherCAT Mailbox dissector could abort.
The CTDB dissector could go into a large loop.
The pcap-ng file parser could trigger a zero division.
The Ixia IxVeriWave file parser could overflow a buffer.
www.wireshark.org/security/wnpa-sec-2012-11.html
www.wireshark.org/security/wnpa-sec-2012-12.html
www.wireshark.org/security/wnpa-sec-2012-13.html
www.wireshark.org/security/wnpa-sec-2012-14.html
www.wireshark.org/security/wnpa-sec-2012-15.html
www.wireshark.org/security/wnpa-sec-2012-16.html
www.wireshark.org/security/wnpa-sec-2012-17.html
www.wireshark.org/security/wnpa-sec-2012-18.html
www.wireshark.org/security/wnpa-sec-2012-19.html
www.wireshark.org/security/wnpa-sec-2012-20.html
www.wireshark.org/security/wnpa-sec-2012-21.html
www.wireshark.org/security/wnpa-sec-2012-22.html
www.wireshark.org/security/wnpa-sec-2012-23.html
www.wireshark.org/security/wnpa-sec-2012-24.html
www.wireshark.org/security/wnpa-sec-2012-25.html