Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [day] [month] [year] [list]
Date: Thu, 14 May 2015 20:33:38 +0200
From: Hanno Böck <>
Subject: Read heap overflow / invalid memory access in Wireshark

The Wireshark parser code for Android Logcat network packages contained
a read heap overflow in the function detect_version().

This issue was reported to the Wireshark developers on May 5th. It was
fixed in the 1.12.5 release of Wireshark, published on May 12th. The
beta release 1.99.5 and the Git head code are not affected.

Appart from this issue Wireshark 1.12.5 fixes seven other security
Wireshark 1.12.5 Release Notes
Wireshark bug #11188,commit:afeff4f,n,z
Commit / fix
Sample pcap file triggering the overflow (test with tshark -r [input],
can be seen with valgrind or address sanitizer)

Hanno Böck


Content of type "application/pgp-signature" skipped

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ