{"id":"CVE-2012-4294","details":"Buffer overflow in the channelised_fill_sdh_g707_format function in epan/dissectors/packet-erf.c in the ERF dissector in Wireshark 1.8.x before 1.8.2 allows remote attackers to execute arbitrary code via a large speed (aka rate) value.","modified":"2026-02-05T14:52:13.136837Z","published":"2012-08-16T10:38:08Z","related":["openSUSE-SU-2024:10199-1"],"references":[{"type":"ADVISORY","url":"http://secunia.com/advisories/50276"},{"type":"ADVISORY","url":"http://secunia.com/advisories/51363"},{"type":"ADVISORY","url":"http://secunia.com/advisories/54425"},{"type":"ADVISORY","url":"http://www.wireshark.org/security/wnpa-sec-2012-16.html"},{"type":"ARTICLE","url":"https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_wireshark3"},{"type":"EVIDENCE","url":"http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-erf.c?r1=44377&r2=44376&pathrev=44377"},{"type":"FIX","url":"http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-erf.c?r1=44377&r2=44376&pathrev=44377"},{"type":"REPORT","url":"https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7563"},{"type":"WEB","url":"http://anonsvn.wireshark.org/viewvc?view=revision&revision=44377"},{"type":"WEB","url":"http://www.gentoo.org/security/en/glsa/glsa-201308-05.xml"},{"type":"WEB","url":"http://www.securityfocus.com/bid/55035"},{"type":"WEB","url":"https://hermes.opensuse.org/messages/15514562"},{"type":"WEB","url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15673"}],"schema_version":"1.7.3"}