Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2011-1956Wireshark vulnerability

6 documents6 sources
Severity
4.3MEDIUMNVD
EPSS
6.1%
top 9.24%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedJun 6
Latest updateMay 17

Description

The bytes_repr_len function in Wireshark 1.4.5 uses an incorrect pointer argument, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via arbitrary TCP traffic.

CVSS vector

AV:N/AC:M/C:N/I:N/A:PExploitability: 8.6 | Impact: 2.9

Affected Packages3 packages

debiandebian/wireshark< wireshark 1.4.6-1 (bookworm)
Debianwireshark/wireshark< 1.4.6-1+3

Patches

🔴Vulnerability Details

2
GHSA
GHSA-hqw9-f827-9xw8: The bytes_repr_len function in Wireshark 12022-05-17
OSV
CVE-2011-1956: The bytes_repr_len function in Wireshark 12011-06-06

💥Exploits & PoCs

1
Exploit-DB
Wireshark 1.4.5 - 'bytes_repr_len()' Null Pointer Dereference Denial of Service2011-06-17

📋Vendor Advisories

2
Debian
CVE-2011-1956: wireshark - The bytes_repr_len function in Wireshark 1.4.5 uses an incorrect pointer argumen...2011
Red Hat
CVE-2011-1956: The bytes_repr_len function in Wireshark 1