Integer signedness error in the vwr_read_rec_data_ethernet function in wiretap/vwr.c in the Ixia IxVeriWave file parser in Wireshark 1.8.x before 1.8.2 allows user-assisted remote attackers to execute arbitrary code via a crafted packet-trace file that triggers a buffer overflow.
Weaknesses in this category are related to improper calculation or conversion of numbers.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/55035 | vdb entry |
http://anonsvn.wireshark.org/viewvc/trunk/wiretap/vwr.c?r1=44075&r2=44074&pathrev=44075 | patch exploit |
http://secunia.com/advisories/54425 | third party advisory |
http://www.wireshark.org/security/wnpa-sec-2012-25.html | vendor advisory |
https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_wireshark3 | |
http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml | vendor advisory |
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7533 | |
http://secunia.com/advisories/51363 | third party advisory |
http://anonsvn.wireshark.org/viewvc?revision=44075&view=revision | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15777 | vdb entry signature |
http://secunia.com/advisories/50276 | third party advisory |
https://hermes.opensuse.org/messages/15514562 | vendor advisory |