fkie_cve-2012-2394
Vulnerability from fkie_nvd
Published
2012-06-30 10:15
Modified
2025-04-11 00:51
Severity ?
Summary
Wireshark 1.4.x before 1.4.13 and 1.6.x before 1.6.8 on the SPARC and Itanium platforms does not properly perform data alignment for a certain structure member, which allows remote attackers to cause a denial of service (application crash) via a (1) ICMP or (2) ICMPv6 Echo Request packet.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wireshark:wireshark:1.4.0:*:*:*:*:*:itanium:*", "matchCriteriaId": "9AE0BCEC-DCA5-4EBC-8B46-2496EAE08953", "vulnerable": true }, { "criteria": "cpe:2.3:a:wireshark:wireshark:1.4.0:*:*:*:*:*:sparc:*", "matchCriteriaId": "B093B876-844B-4715-B2CE-CDD42948E973", "vulnerable": true }, { "criteria": "cpe:2.3:a:wireshark:wireshark:1.4.1:*:*:*:*:*:itanium:*", "matchCriteriaId": "194C5E9B-09D6-4C87-838E-4305B7D451B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:wireshark:wireshark:1.4.1:*:*:*:*:*:sparc:*", "matchCriteriaId": "CF37E0D5-FBD9-45E9-8E61-7EAE1D66ECC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:wireshark:wireshark:1.4.2:*:*:*:*:*:itanium:*", "matchCriteriaId": "7AEA0C96-A37B-469F-835A-6070855851BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:wireshark:wireshark:1.4.2:*:*:*:*:*:sparc:*", "matchCriteriaId": "23AF2022-AA7A-475E-A52B-88F8894A3EF7", "vulnerable": true }, { "criteria": "cpe:2.3:a:wireshark:wireshark:1.4.3:*:*:*:*:*:itanium:*", "matchCriteriaId": "78B55746-344A-4390-AC58-C0A6ABD7A233", "vulnerable": true }, { "criteria": "cpe:2.3:a:wireshark:wireshark:1.4.3:*:*:*:*:*:sparc:*", "matchCriteriaId": "6BEC3867-9E77-4BAE-8396-EEA697F643C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:wireshark:wireshark:1.4.4:*:*:*:*:*:itanium:*", "matchCriteriaId": "9881961C-65C7-4C88-945E-7B675AF5920C", "vulnerable": true }, { "criteria": "cpe:2.3:a:wireshark:wireshark:1.4.4:*:*:*:*:*:sparc:*", "matchCriteriaId": "143A842F-A74E-4C57-9675-D9C267A8DB77", "vulnerable": true }, { "criteria": "cpe:2.3:a:wireshark:wireshark:1.4.5:*:*:*:*:*:itanium:*", "matchCriteriaId": "C8B02BA5-16DA-4988-95ED-060086BF4DDD", "vulnerable": true }, { "criteria": "cpe:2.3:a:wireshark:wireshark:1.4.5:*:*:*:*:*:sparc:*", "matchCriteriaId": "0D8D4E9C-40B0-43C5-88EA-656B6CD551A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:wireshark:wireshark:1.4.6:*:*:*:*:*:itanium:*", "matchCriteriaId": "3CDA5918-9018-492A-9084-987A07E7E444", "vulnerable": true }, { "criteria": "cpe:2.3:a:wireshark:wireshark:1.4.6:*:*:*:*:*:sparc:*", "matchCriteriaId": "D083D5ED-B5A8-43DB-80ED-9131CA425B79", "vulnerable": true }, { "criteria": "cpe:2.3:a:wireshark:wireshark:1.4.7:*:*:*:*:*:itanium:*", "matchCriteriaId": "1F13EB9E-C89B-4C17-98A0-029357BCDE93", "vulnerable": true }, { "criteria": "cpe:2.3:a:wireshark:wireshark:1.4.7:*:*:*:*:*:sparc:*", "matchCriteriaId": "09FD0AED-8542-4D44-B989-0CC3EFD7FA92", "vulnerable": true }, { "criteria": "cpe:2.3:a:wireshark:wireshark:1.4.8:*:*:*:*:*:itanium:*", "matchCriteriaId": "93AA4269-6F6B-49EA-91FB-E9355E17E05E", "vulnerable": true }, { "criteria": "cpe:2.3:a:wireshark:wireshark:1.4.8:*:*:*:*:*:sparc:*", "matchCriteriaId": "BDA17B07-F990-4D44-97FB-3352729F0A3C", "vulnerable": true }, { "criteria": "cpe:2.3:a:wireshark:wireshark:1.4.9:*:*:*:*:*:itanium:*", "matchCriteriaId": "A9D1FDBD-62F5-4989-9CE2-9080AFF505DA", "vulnerable": true }, { "criteria": "cpe:2.3:a:wireshark:wireshark:1.4.9:*:*:*:*:*:sparc:*", "matchCriteriaId": "8B9DAA02-A9DA-44B2-B037-66C5B1E5613B", "vulnerable": true }, { "criteria": "cpe:2.3:a:wireshark:wireshark:1.4.10:*:*:*:*:*:itanium:*", "matchCriteriaId": "8DC4A0C2-693D-4769-A6F6-FFF32EB6312B", "vulnerable": true }, { "criteria": "cpe:2.3:a:wireshark:wireshark:1.4.10:*:*:*:*:*:sparc:*", "matchCriteriaId": "A9F85E91-789F-4FBD-BC3D-BF364370626C", "vulnerable": true }, { "criteria": "cpe:2.3:a:wireshark:wireshark:1.4.11:*:*:*:*:*:itanium:*", "matchCriteriaId": "DF2F925E-1C05-4089-8156-449C39EA835E", "vulnerable": true }, { "criteria": "cpe:2.3:a:wireshark:wireshark:1.4.11:*:*:*:*:*:sparc:*", "matchCriteriaId": "E3B5705B-6035-48B6-A22A-E16B746A9859", "vulnerable": true }, { "criteria": "cpe:2.3:a:wireshark:wireshark:1.4.12:*:*:*:*:*:itanium:*", "matchCriteriaId": "B874CA02-00B8-44B3-AE5E-07F9E2D197AF", "vulnerable": true }, { "criteria": "cpe:2.3:a:wireshark:wireshark:1.4.12:*:*:*:*:*:sparc:*", "matchCriteriaId": "1E2290F9-9E09-4FFC-AC43-A8705B9D9676", "vulnerable": true }, { "criteria": "cpe:2.3:a:wireshark:wireshark:1.4.13:*:*:*:*:*:itanium:*", "matchCriteriaId": "5F55E2BB-98B1-475F-9A6D-0255259B68D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:wireshark:wireshark:1.4.13:*:*:*:*:*:sparc:*", "matchCriteriaId": "77F5E970-F04D-4C4B-B6B6-F91DA694E655", "vulnerable": true }, { "criteria": "cpe:2.3:a:wireshark:wireshark:1.6.0:*:*:*:*:*:itanium:*", "matchCriteriaId": "C9A893FF-491B-47AA-B386-F000ABF6029C", "vulnerable": true }, { "criteria": "cpe:2.3:a:wireshark:wireshark:1.6.0:*:*:*:*:*:sparc:*", "matchCriteriaId": "6B30017C-780E-445A-A575-04DC1340FB1D", "vulnerable": true }, { "criteria": "cpe:2.3:a:wireshark:wireshark:1.6.1:*:*:*:*:*:itanium:*", "matchCriteriaId": "C1970DAF-B550-4F0B-A8B5-C707A7068709", "vulnerable": true }, { "criteria": "cpe:2.3:a:wireshark:wireshark:1.6.1:*:*:*:*:*:sparc:*", "matchCriteriaId": "27D99B1E-183B-4717-B60F-E35F03AB1606", "vulnerable": true }, { "criteria": "cpe:2.3:a:wireshark:wireshark:1.6.2:*:*:*:*:*:itanium:*", "matchCriteriaId": "C6A6B368-FDD9-4131-9CF3-E7E22070B381", "vulnerable": true }, { "criteria": "cpe:2.3:a:wireshark:wireshark:1.6.2:*:*:*:*:*:sparc:*", "matchCriteriaId": "AE760EB6-B522-4229-B17D-53D2A8E0B4BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:wireshark:wireshark:1.6.3:*:*:*:*:*:itanium:*", "matchCriteriaId": "AE3D2921-1531-488B-864A-75A33069D151", "vulnerable": true }, { "criteria": "cpe:2.3:a:wireshark:wireshark:1.6.3:*:*:*:*:*:sparc:*", "matchCriteriaId": "91FC0DF1-D2EB-4093-B637-7D591B909A77", "vulnerable": true }, { "criteria": "cpe:2.3:a:wireshark:wireshark:1.6.4:*:*:*:*:*:itanium:*", "matchCriteriaId": "671FDE84-9668-42A8-A2B3-887E7976E3C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:wireshark:wireshark:1.6.4:*:*:*:*:*:sparc:*", "matchCriteriaId": "AE58EA40-6CA8-4EBA-B70A-364EC46CEFFB", "vulnerable": true }, { "criteria": "cpe:2.3:a:wireshark:wireshark:1.6.5:*:*:*:*:*:itanium:*", "matchCriteriaId": "95B0702A-96EB-40A5-97DA-C45A41165C75", "vulnerable": true }, { "criteria": "cpe:2.3:a:wireshark:wireshark:1.6.5:*:*:*:*:*:sparc:*", "matchCriteriaId": "398172D5-F100-4F81-9A15-84B3E7867334", "vulnerable": true }, { "criteria": "cpe:2.3:a:wireshark:wireshark:1.6.6:*:*:*:*:*:itanium:*", "matchCriteriaId": "9798C8E2-6334-4298-95EC-440D7F39A012", "vulnerable": true }, { "criteria": "cpe:2.3:a:wireshark:wireshark:1.6.6:*:*:*:*:*:sparc:*", "matchCriteriaId": "D784A072-A888-4B1C-8587-03B7BBA357EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:wireshark:wireshark:1.6.7:*:*:*:*:*:itanium:*", "matchCriteriaId": "12451F89-F059-4183-8073-0688792D2F8C", "vulnerable": true }, { "criteria": "cpe:2.3:a:wireshark:wireshark:1.6.7:*:*:*:*:*:sparc:*", "matchCriteriaId": "DBD3FCA6-0970-4423-AA50-191E533EF775", "vulnerable": true }, { "criteria": "cpe:2.3:a:wireshark:wireshark:1.6.8:*:*:*:*:*:itanium:*", "matchCriteriaId": "6551DA99-2B0C-45F3-A591-F4C7905B11BB", "vulnerable": true }, { "criteria": "cpe:2.3:a:wireshark:wireshark:1.6.8:*:*:*:*:*:sparc:*", "matchCriteriaId": "5AE98019-8B50-476E-8116-11FDE4EC6648", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Wireshark 1.4.x before 1.4.13 and 1.6.x before 1.6.8 on the SPARC and Itanium platforms does not properly perform data alignment for a certain structure member, which allows remote attackers to cause a denial of service (application crash) via a (1) ICMP or (2) ICMPv6 Echo Request packet." }, { "lang": "es", "value": "Wireshark 1.4.x anteriores a 1.4.13 y 1.6.x anteriores a 1.6.8 en plataformas SPARC e Itanium no realizan adecuadamente la alineaci\u00f3n en memoria de miembros de estructuras determinados, lo que permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda de la aplicaci\u00f3n) a trav\u00e9s de un paquete de petici\u00f3n Echo (1) ICMP o (2) ICMPv6." } ], "id": "CVE-2012-2394", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 3.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 6.5, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-06-30T10:15:05.107", "references": [ { "source": "secalert@redhat.com", "tags": [ "Patch" ], "url": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=42393" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/49226" }, { "source": "secalert@redhat.com", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:015" }, { "source": "secalert@redhat.com", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:042" }, { "source": "secalert@redhat.com", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:080" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/53653" }, { "source": "secalert@redhat.com", "url": "http://www.securitytracker.com/id?1027094" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://www.wireshark.org/security/wnpa-sec-2012-10.html" }, { "source": "secalert@redhat.com", "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7221" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://anonsvn.wireshark.org/viewvc?view=revision\u0026revision=42393" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/49226" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:015" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:042" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:080" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/53653" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1027094" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.wireshark.org/security/wnpa-sec-2012-10.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7221" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…