CVE-2012-6054
Published Dec 5, 2012
Last updated 7 years ago
Overview
- Description
- The dissect_sflow_245_address_type function in epan/dissectors/packet-sflow.c in the sFlow dissector in Wireshark 1.8.x before 1.8.4 does not properly handle length calculations for an invalid IP address type, which allows remote attackers to cause a denial of service (infinite loop) via a packet that is neither IPv4 nor IPv6.
- Source
- cve@mitre.org
- NVD status
- Modified
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 5
- Impact score
- 2.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:N/I:N/A:P
Weaknesses
- nvd@nist.gov
- CWE-189
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:wireshark:wireshark:1.8.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "606DF728-1DA6-4989-B40A-44471CC677DB" }, { "criteria": "cpe:2.3:a:wireshark:wireshark:1.8.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F824AE6B-B087-4C69-8F73-7B146920FC3C" }, { "criteria": "cpe:2.3:a:wireshark:wireshark:1.8.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6702EAA1-7FBD-4755-B7C2-C2B3A1AFF142" }, { "criteria": "cpe:2.3:a:wireshark:wireshark:1.8.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AF6D1967-500E-4E96-A6D2-CE17EA839572" } ], "operator": "OR" } ] } ]