Wireshark: Heap-based Buffer-overflow Vulnerability

Users of Wireshark please be advised of a Heap-based buffer overflow vulnerability that has been identified.
To view this vulnerability, possible remedies, and others please check out the Security Advisories at Critical Watch (http://criticalwatch.com/support/security-advisories.aspx)

MDVSA-2010:242: [MDVSA-2010:242] wireshark Buffer-overflow
Problem Description:

This advisory updates wireshark to the latest version (1.2.13),

fixing one security issue:

Heap-based buffer overflow in the dissect_ldss_transfer function

(epan/dissectors/packet-ldss.c) in the LDSS dissector in Wireshark

1.2.0 through 1.2.12 and 1.4.0 through 1.4.1 allows remote attackers

to cause a denial of service (crash) and possibly execute arbitrary

code via an LDSS packet with a long digest line that triggers memory

corruption (CVE-2010-4300).

Read more at http://www.criticalwatch.com

 

Advertisements