CVE-2012-0066Improper Input Validation in Wireshark

Severity
4.3MEDIUMNVD
EPSS
2.9%
top 13.68%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 11
Latest updateMay 4

Description

Wireshark 1.4.x before 1.4.11 and 1.6.x before 1.6.5 allows remote attackers to cause a denial of service (application crash) via a long packet in a (1) Accellent 5Views (aka .5vw) file, (2) I4B trace file, or (3) NETMON 2 capture file.

CVSS vector

AV:N/AC:M/C:N/I:N/A:PExploitability: 8.6 | Impact: 2.9

Affected Packages3 packages

debiandebian/wireshark< wireshark 1.6.5-1 (bookworm)
Debianwireshark/wireshark< 1.6.5-1+3
NVDwireshark/wireshark16 versions+15

Also affects: Enterprise Linux 5

Patches

🔴Vulnerability Details

2
GHSA
GHSA-4435-68hj-c5gh: Wireshark 12022-05-04
OSV
CVE-2012-0066: Wireshark 12012-04-11

📋Vendor Advisories

2
Red Hat
Wireshark: Dos via large buffer allocation request2012-01-10
Debian
CVE-2012-0066: wireshark - Wireshark 1.4.x before 1.4.11 and 1.6.x before 1.6.5 allows remote attackers to ...2012

💬Community

2
Bugzilla
CVE-2012-0066 Wireshark: Dos via large buffer allocation request2012-01-20
Bugzilla
CVE-2012-0041 CVE-2012-0042 CVE-2012-0043 CVE-2012-0066 CVE-2012-0067 CVE-2012-0068 wireshark various flaws [fedora-all]2012-01-13