CVE-2013-2486

Publication date 7 March 2013

Last updated 24 July 2024


Ubuntu priority

The dissect_diagnosticrequest function in epan/dissectors/packet-reload.c in the REsource LOcation And Discovery (aka RELOAD) dissector in Wireshark 1.8.x before 1.8.6 uses an incorrect integer data type, which allows remote attackers to cause a denial of service (infinite loop) via crafted integer values in a packet.

Status

Package Ubuntu Release Status
wireshark 14.04 LTS trusty
Not affected
13.10 saucy
Not affected
13.04 raring Ignored end of life
12.10 quantal Ignored end of life
12.04 LTS precise
Not affected
11.10 oneiric
Not affected
10.04 LTS lucid
Not affected
8.04 LTS hardy
Not affected

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
wireshark