Vulnerability Description
Stack-based buffer overflow in the DECT dissector in epan/dissectors/packet-dect.c in Wireshark 1.4.x before 1.4.5 allows remote attackers to execute arbitrary code via a crafted .pcap file.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Wireshark | Wireshark | 1.4.0 |
Related Weaknesses (CWE)
References
- http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058900.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058983.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-April/058993.html
- http://openwall.com/lists/oss-security/2011/04/18/2
- http://openwall.com/lists/oss-security/2011/04/18/8
- http://secunia.com/advisories/44172
- http://secunia.com/advisories/44374
- http://securitytracker.com/id?1025389
- http://www.exploit-db.com/exploits/17185Exploit
- http://www.exploit-db.com/exploits/17195
- http://www.kb.cert.org/vuls/id/243670US Government Resource
- http://www.mandriva.com/security/advisories?name=MDVSA-2011:083
- http://www.osvdb.org/71848
- http://www.vupen.com/english/advisories/2011/1022Vendor Advisory
- http://www.vupen.com/english/advisories/2011/1106
FAQ
What is CVE-2011-1591?
CVE-2011-1591 is a vulnerability with a CVSS score of 9.3 (HIGH). Stack-based buffer overflow in the DECT dissector in epan/dissectors/packet-dect.c in Wireshark 1.4.x before 1.4.5 allows remote attackers to execute arbitrary code via a crafted .pcap file.
How severe is CVE-2011-1591?
CVE-2011-1591 has been rated HIGH with a CVSS base score of 9.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2011-1591?
Check the references section above for vendor advisories and patch information. Affected products include: Wireshark Wireshark.