New Search

epan/dissectors/packet-reload.c in the REsource LOcation And Discovery (aka RELOAD) dissector in Wireshark 1.8.x before 1.8.6 uses incorrect integer data types which allows remote attackers to cause a denial of service (infinite loop) via crafted integer values in a packet related to the (1) dissect_icecandidates (2) dissect_kinddata (3) dissect_nodeid_list (4) dissect_storeans (5) dissect_storereq (6) dissect_storeddataspecifier (7) dissect_fetchreq (8) dissect_findans (9) dissect_diagnosticinfo (10) dissect_diagnosticresponse (11) dissect_reload_messagecontents and (12) dissect_reload_message functions a different vulnerability than CVE-2013-2486

oval:org.mitre.oval:def:16593

epan/dissectors/packet-reload.c in the REsource LOcation And Discovery (aka RELOAD) dissector in Wireshark 1.8.x before 1.8.6 uses incorrect integer data types which allows remote attackers to cause a denial of service (infinite loop) via crafted integer values in a packet related to the (1) dissect_icecandidates (2) dissect_kinddata (3) dissect_nodeid_list (4) dissect_storeans (5) dissect_storereq (6) dissect_storeddataspecifier (7) dissect_fetchreq (8) dissect_findans (9) dissect_diagnosticinfo (10) dissect_diagnosticresponse (11) dissect_reload_messagecontents and (12) dissect_reload_message functions a different vulnerability than CVE-2013-2486.

Family:
windows
Status:
ACCEPTED
Platform(s):
  • Microsoft Windows 2000
  • Microsoft Windows Server 2003
  • Microsoft Windows XP
  • Microsoft Windows 7
  • Microsoft Windows Server 2008
  • Microsoft Windows 8
  • Microsoft Windows Server 2008 R2
  • Microsoft Windows Vista
  • Microsoft Windows Server 2012
Class:
vulnerability
Reference(s):
  • CVE-2013-2487
Product(s):
  • Wireshark