CVE-2013-3556

Publication date 25 May 2013

Last updated 24 July 2024


Ubuntu priority

The fragment_add_seq_common function in epan/reassemble.c in the ASN.1 BER dissector in Wireshark before r48943 has an incorrect pointer dereference during a comparison, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.

Read the notes from the security team

Status

No maintained releases are affected by this CVE.

Package Ubuntu Release Status
wireshark 13.04 raring
Not affected
12.10 quantal
Not affected
12.04 LTS precise
Not affected
10.04 LTS lucid
Not affected

Notes


seth-arnold

apparently only in trunk, see also CVE-2013-3557

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
wireshark