Revision Date: | 2017-09-27 | Version: | 1 |
Title: | CVE-2012-6054 |
Description: |
The dissect_sflow_245_address_type function in epan/dissectors/packet-sflow.c in the sFlow dissector in Wireshark 1.8.x before 1.8.4 does not properly handle length calculations for an invalid IP address type, which allows remote attackers to cause a denial of service (infinite loop) via a packet that is neither IPv4 nor IPv6.
|
Family: | unix | Class: | vulnerability |
Status: | | Reference(s): | CVE-2012-6054
|
Platform(s): | SLE SDK 10 SP4 for IBM iSeries and IBM pSeries SLE SDK 10 SP4 for IBM zSeries SLE SDK 10 SP4 for IPF SLE SDK 10 SP4 for x86 SLE SDK 10 SP4 for X86-64 SUSE Linux Enterprise Desktop 10 SP4 for AMD64 and Intel EM64T SUSE Linux Enterprise Desktop 10 SP4 for x86 SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T SUSE Linux Enterprise Server 10 SP4 for IBM POWER SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit SUSE Linux Enterprise Server 10 SP4 for IPF SUSE Linux Enterprise Server 10 SP4 for x86 SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T
| Product(s): | |
Definition Synopsis |
Release Information sles10-sp4 is installed
AND
wireshark-devel less than 1.6.14-0.5.1
OR wireshark less than 1.6.14-0.5.1
OR Package Information
sles10-sp4-sdk is installed
AND wireshark-devel less than 1.6.14-0.5.1
|