Definition
New Search
The dissect_sflow_245_address_type function in epan/dissectors/packet-sflow.c in the sFlow dissector in Wireshark 1.8.x before 1.8.4 does not properly handle length calculations for an invalid IP address type
oval:org.mitre.oval:def:15764
The dissect_sflow_245_address_type function in epan/dissectors/packet-sflow.c in the sFlow dissector in Wireshark 1.8.x before 1.8.4 does not properly handle length calculations for an invalid IP address type which allows remote attackers to cause a denial of service (infinite loop) via a packet that is neither IPv4 nor IPv6.
Family:
windows
Status:
ACCEPTED
Platform(s):
- Microsoft Windows Server 2008
- Microsoft Windows Server 2012
- Microsoft Windows 8
- Microsoft Windows Vista
- Microsoft Windows 2000
- Microsoft Windows 7
- Microsoft Windows Server 2003
- Microsoft Windows XP
- Microsoft Windows Server 2008 R2
Class:
vulnerability
Reference(s):
- CVE-2012-6054
Product(s):
- Wireshark