The PPP dissector in Wireshark 1.4.x before 1.4.14, 1.6.x before 1.6.9, and 1.8.x before 1.8.1 allows remote attackers to cause a denial of service (invalid pointer dereference and application crash) via a crafted packet, as demonstrated by a usbmon dump.
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Link | Tags |
---|---|
http://secunia.com/advisories/49971 | third party advisory |
http://www.debian.org/security/2012/dsa-2590 | vendor advisory |
http://secunia.com/advisories/54425 | third party advisory |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15547 | signature vdb entry |
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=680056 | |
http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml | vendor advisory |
http://www.wireshark.org/security/wnpa-sec-2012-11.html | vendor advisory |
http://lists.opensuse.org/opensuse-updates/2012-08/msg00000.html | vendor advisory |