Wireshark Protocol Dissectors Multiple Vulnerabilities
Wireshark is prone to multiple vulnerabilities:
- A format-string vulnerability.
- An off-by-one vulnerability.
- An infinite-loop vulnerability.
- A memory-allocation vulnerability.
These may permit attackers to execute arbitrary code, which can facilitate a compromise of an affected computer or cause a denial-of-service condition to legitimate users of the application.