CVE-2012-0043
Published Apr 11, 2012
Last updated 7 years ago
Overview
- Description
- Buffer overflow in the reassemble_message function in epan/dissectors/packet-rlc.c in the RLC dissector in Wireshark 1.4.x before 1.4.11 and 1.6.x before 1.6.5 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a series of fragmented RLC packets.
- Source
- secalert@redhat.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 5.8
- Impact score
- 6.4
- Exploitability score
- 6.5
- Vector string
- AV:A/AC:L/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-119
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:wireshark:wireshark:1.4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "ABB6F1D5-64CC-474D-B123-818080ED7903" }, { "criteria": "cpe:2.3:a:wireshark:wireshark:1.4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A5E0F58D-4CE5-4051-A0F6-9BFA2FC0D2DB" }, { "criteria": "cpe:2.3:a:wireshark:wireshark:1.4.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1CC3D171-73D0-4A14-A2AA-60C9739CD840" }, { "criteria": "cpe:2.3:a:wireshark:wireshark:1.4.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CF840746-1797-4ACC-8AFD-8FBD97E9F706" }, { "criteria": "cpe:2.3:a:wireshark:wireshark:1.4.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "87AA0CD8-5F45-4F3C-B72E-6D94EA4B2C8B" }, { "criteria": "cpe:2.3:a:wireshark:wireshark:1.4.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7E96B426-8563-4BC2-909A-72457D7159FF" }, { "criteria": "cpe:2.3:a:wireshark:wireshark:1.4.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "452E7B6C-88FF-4402-92A2-D417928C3A7F" }, { "criteria": "cpe:2.3:a:wireshark:wireshark:1.4.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9049C8A8-BC0A-4D0E-BAFE-9D798C61DE5C" }, { "criteria": "cpe:2.3:a:wireshark:wireshark:1.4.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A2F262A5-9475-4F36-920C-E98099F0190A" }, { "criteria": "cpe:2.3:a:wireshark:wireshark:1.4.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "57B487D4-4AD7-4BE7-86AB-134EEC8D05FA" }, { "criteria": "cpe:2.3:a:wireshark:wireshark:1.4.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FBFA1229-1497-4C9E-8CCA-CEBA34F446AE" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:wireshark:wireshark:1.6.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0738C9A6-0370-447D-91E6-EB59ECC92224" }, { "criteria": "cpe:2.3:a:wireshark:wireshark:1.6.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "05A83A69-D49D-48D0-8FFE-4887F15ACD33" }, { "criteria": "cpe:2.3:a:wireshark:wireshark:1.6.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B9CA0830-9AFE-499F-903F-D9C3B5CCC982" }, { "criteria": "cpe:2.3:a:wireshark:wireshark:1.6.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "178B042E-A628-4C40-BEDB-80200252D301" }, { "criteria": "cpe:2.3:a:wireshark:wireshark:1.6.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D72AEB47-B059-4DF4-9414-E8EE0024997B" } ], "operator": "OR" } ] } ]