|Title:||Wireshark Stack-based Buffer Overflow Vulnerability (Win)|
|Summary:||Check the version of Wireshark|
Overview: The host is installed with Wireshark and is prone to Stack-based
Buffer Overflow Vulnerability.
The flaw is due to an error in handling 'ASN.1 BER dissector' which
could be used to exhaust stack memory.
Successful exploitation could allow attackers to cause buffer overflow.
Impact Level: Application
Wireshark version 1.2.0 through 1.2.9
Wireshark version 0.10.13 through 1.0.14
Fix: Upgrade to the Wireshark version 1.0.15 or 1.2.10 or later,
For updates refer to http://www.wireshark.org/download.html
Common Vulnerability Exposure (CVE) ID: CVE-2010-2994|
SuSE Security Announcement: SUSE-SR:2011:001 (Google Search)
SuSE Security Announcement: SUSE-SR:2011:002 (Google Search)
|Copyright||Copyright (c) 2010 Greenbone Networks GmbH|
|This is only one of 39212 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.