{ "CVE_data_meta" : { "ASSIGNER" : "cve@mitre.org", "ID" : "CVE-2011-2175", "STATE" : "PUBLIC" }, "affects" : { "vendor" : { "vendor_data" : [ { "product" : { "product_data" : [ { "product_name" : "n/a", "version" : { "version_data" : [ { "version_value" : "n/a" } ] } } ] }, "vendor_name" : "n/a" } ] } }, "data_format" : "MITRE", "data_type" : "CVE", "data_version" : "4.0", "description" : { "description_data" : [ { "lang" : "eng", "value" : "Integer underflow in the visual_read function in wiretap/visual.c in Wireshark 1.2.x before 1.2.17 and 1.4.x before 1.4.7 allows remote attackers to cause a denial of service (application crash) via a malformed Visual Networks file that triggers a heap-based buffer over-read." } ] }, "problemtype" : { "problemtype_data" : [ { "description" : [ { "lang" : "eng", "value" : "n/a" } ] } ] }, "references" : { "reference_data" : [ { "name" : "[oss-security] 20110531 CVE request for Wireshark 1.4.6/1.2.16 Multiple DoS issues", "refsource" : "MLIST", "url" : "http://openwall.com/lists/oss-security/2011/05/31/20" }, { "name" : "[oss-security] 20110601 Re: CVE request for Wireshark 1.4.6/1.2.16 Multiple DoS issues", "refsource" : "MLIST", "url" : "http://openwall.com/lists/oss-security/2011/06/01/1" }, { "name" : "[oss-security] 20110601 Re: CVE request for Wireshark 1.4.6/1.2.16 Multiple DoS issues", "refsource" : "MLIST", "url" : "http://openwall.com/lists/oss-security/2011/06/01/11" }, { "name" : "http://anonsvn.wireshark.org/viewvc?view=revision&revision=37128", "refsource" : "CONFIRM", "url" : "http://anonsvn.wireshark.org/viewvc?view=revision&revision=37128" }, { "name" : "http://www.wireshark.org/security/wnpa-sec-2011-07.html", "refsource" : "CONFIRM", "url" : "http://www.wireshark.org/security/wnpa-sec-2011-07.html" }, { "name" : "http://www.wireshark.org/security/wnpa-sec-2011-08.html", "refsource" : "CONFIRM", "url" : "http://www.wireshark.org/security/wnpa-sec-2011-08.html" }, { "name" : "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5934", "refsource" : "CONFIRM", "url" : "https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5934" }, { "name" : "https://bugzilla.redhat.com/show_bug.cgi?id=710109", "refsource" : "CONFIRM", "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=710109" }, { "name" : "DSA-2274", "refsource" : "DEBIAN", "url" : "http://www.debian.org/security/2011/dsa-2274" }, { "name" : "FEDORA-2011-7821", "refsource" : "FEDORA", "url" : "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061290.html" }, { "name" : "FEDORA-2011-7846", "refsource" : "FEDORA", "url" : "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061437.html" }, { "name" : "FEDORA-2011-7858", "refsource" : "FEDORA", "url" : "http://lists.fedoraproject.org/pipermail/package-announce/2011-June/061477.html" }, { "name" : "RHSA-2013:0125", "refsource" : "REDHAT", "url" : "http://rhn.redhat.com/errata/RHSA-2013-0125.html" }, { "name" : "48066", "refsource" : "BID", "url" : "http://www.securityfocus.com/bid/48066" }, { "name" : "oval:org.mitre.oval:def:14645", "refsource" : "OVAL", "url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14645" }, { "name" : "44449", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/44449" }, { "name" : "45149", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/45149" }, { "name" : "44958", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/44958" }, { "name" : "48947", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/48947" } ] } }