wnpa-sec-2012-18 · Wireshark RTPS2 dissector buffer overflow
Summary
Name: Wireshark RTPS2 dissector buffer overflow
Docid: wnpa-sec-2012-18
Date: August 15, 2012
Affected versions: 1.4.0 to 1.4.14, 1.6.0 to 1.6.9, 1.8.0 to 1.8.1
Fixed versions: 1.8.2, 1.6.10, 1.4.15
References: Wireshark bug 7568
CVE-2012-4296
Details
Description
The RTPS2 dissector could overflow a buffer. Reported by Laurent Butti.
Impact
It may be possible to make Wireshark consume excessive CPU resources by injecting a malformed packet onto the wire or by convincing someone to read a malformed packet trace file.
Resolution
Upgrade to Wireshark 1.8.2, 1.6.10, 1.4.15 or later.
Go Beyond with Riverbed Technology
I have a lot of traffic...
ANSWER: SteelCentral™ AppResponse 11
- • Full stack analysis – from packets to pages
- • Rich performance metrics & pre-defined insights for fast problem identification/resolution
- • Modular, flexible solution for deeply-analyzing network & application performance