Summary
The host is installed with Wireshark and is prone to multiple DoS vulnerability.
Impact
Successful exploitation could allow remote attackers to cause a denial of service.
Impact Level: Application
Solution
Upgrade to the Wireshark version 1.4.4
For updates refer to http://www.wireshark.org/download.html
Insight
The flaw is due to 'Off-by-one' error in the dissect_6lowpan_iphc function in packet-6lowpan.c
Affected
Wireshark version 1.4.0 through 1.4.3
References
Severity
Classification
-
CVE CVE-2011-1138 -
CVSS Base Score: 4.3
AV:N/AC:M/Au:N/C:N/I:N/A:P
Related Vulnerabilities
- FreeRADIUS Tunnel-Password Denial Of Service Vulnerability
- FreeType Memory Corruption and Buffer Overflow Vulnerabilities (Windows)
- Asterisk RTP Text Frames Denial Of Service Vulnerability
- Apple Safari Malformed URI Remote DoS Vulnerability (Win)
- Apple Safari JavaScript 'Reload()' DoS Vulnerability - July09