| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 4.8 | $0-$5k | 0.00 |
Summary
A vulnerability marked as problematic has been reported in Wireshark 1.6.0/1.6.1. This impacts an unknown function. This manipulation causes memory corruption. This vulnerability appears as CVE-2011-3483. In addition, an exploit is available. It is suggested to upgrade the affected component.
Details
A vulnerability classified as problematic was found in Wireshark 1.6.0/1.6.1 (Packet Analyzer Software). Affected by this vulnerability is an unknown code. The manipulation with an unknown input leads to a memory corruption vulnerability. The CWE definition for the vulnerability is CWE-119. The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer. As an impact it is known to affect availability. The summary by CVE is:
Wireshark 1.6.x before 1.6.2 allows remote attackers to cause a denial of service (application crash) via a malformed capture file that leads to an invalid root tvbuff, related to a "buffer exception handling vulnerability."
The weakness was presented 09/20/2011 with Wireshark as Bug 737785 as not defined bug report (Bugzilla). The advisory is shared at bugzilla.redhat.com. This vulnerability is known as CVE-2011-3483. The attack can be launched remotely. The exploitation doesn't need any form of authentication. Technical details are unknown but a public exploit is available.
A public exploit has been developed in pcap File. It is possible to download the exploit at securityfocus.com. It is declared as proof-of-concept. The vulnerability scanner Nessus provides a plugin with the ID 57735 (Debian DSA-2395-1 : wireshark - buffer underflow), which helps to determine the existence of the flaw in a target environment. It is assigned to the family Debian Local Security Checks.
Upgrading to version 1.6.1 eliminates this vulnerability.
The vulnerability is also documented in the databases at X-Force (69674), Exploit-DB (36128), Tenable (57735), SecurityFocus (BID 49521†) and Vulnerability Center (SBV-33394†). See VDB-56370 and VDB-60574 for similar entries. If you want to get the best quality for vulnerability data then you always have to consider VulDB.
Product
Type
Name
Version
License
Website
- Product: https://www.wireshark.org/
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 5.3VulDB Meta Temp Score: 4.8
VulDB Base Score: 5.3
VulDB Temp Score: 4.8
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Memory corruptionCWE: CWE-119
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Access: Public
Status: Proof-of-Concept
Programming Language: 🔍
Download: 🔍
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Nessus ID: 57735
Nessus Name: Debian DSA-2395-1 : wireshark - buffer underflow
Nessus File: 🔍
Nessus Risk: 🔍
Nessus Family: 🔍
Nessus Port: 🔍
OpenVAS ID: 70713
OpenVAS Name: Debian Security Advisory DSA 2395-1 (wireshark)
OpenVAS File: 🔍
OpenVAS Family: 🔍
Exploit-DB: 🔍
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔍
Upgrade: Wireshark 1.6.1
Timeline
09/07/2011 🔍09/08/2011 🔍
09/14/2011 🔍
09/20/2011 🔍
09/20/2011 🔍
10/03/2011 🔍
01/31/2012 🔍
03/23/2015 🔍
04/17/2025 🔍
Sources
Product: wireshark.orgAdvisory: Bug 737785
Organization: Wireshark
Status: Confirmed
Confirmation: 🔍
CVE: CVE-2011-3483 (🔍)
GCVE (CVE): GCVE-0-2011-3483
GCVE (VulDB): GCVE-100-58573
OVAL: 🔍
X-Force: 69674
SecurityFocus: 49521 - Wireshark Malformed Packet Trace File Remote Denial of Service Vulnerability
Vulnerability Center: 33394 - Wireshark 1.6.x before 1.6.2 Remote Denial of Service Vulnerability via a Malformed Capture File, Medium
scip Labs: https://www.scip.ch/en/?labs.20161013
See also: 🔍
Entry
Created: 03/23/2015 16:50Updated: 04/17/2025 07:33
Changes: 03/23/2015 16:50 (64), 04/03/2017 10:40 (12), 11/20/2021 14:29 (4), 11/20/2021 14:31 (1), 04/17/2025 07:33 (17)
Complete: 🔍
Cache ID: 216:424:103
If you want to get the best quality for vulnerability data then you always have to consider VulDB.
No comments yet. Languages: en.
Please log in to comment.