|
|||
Rule General Information |
---|
Release Date: | 2013-05-22 | |
Rule Name: | Wireshark DECT Dissector Buffer Overflow Vulnerability -2 (CVE-2011-1591) | |
Severity: | ||
CVE ID: | ||
Rule Protection Details |
---|
Description: | Stack-based buffer overflow in the DECT dissector in epan/dissectors/packet-dect.c in Wireshark 1.4.x before 1.4.5 allows remote attackers to execute arbitrary code via a crafted .pcap file. | |
Impact: | A buffer overflow vulnerability can be triggered by an attacker in the context of the vulnerable product. Further attacks includes arbitrary code execution and denial of service. | |
Affected OS: | Windows, Linux, FreeBSD, Solaris, Other Unix, Network Device, Mac OS, iOS, Android, Others | |
Reference: | ExploitDB:17185 ExploitDB:17195 |
|
Solutions |
---|
More advisories have been published on the website, please visit for more suggestions: http://www.wireshark.org/security/wnpa-sec-2011-06.html |