Wireshark Protocol Dissectors Multiple Vulnerabilities

Wireshark is prone to multiple vulnerabilities:

- A format-string vulnerability.
- An off-by-one vulnerability.
- An infinite-loop vulnerability.
- A memory-allocation vulnerability.

These may permit attackers to execute arbitrary code, which can facilitate a compromise of an affected computer or cause a denial-of-service condition to legitimate users of the application.


 

Privacy Statement
Copyright 2010, SecurityFocus