1
Candidate: CVE-2012-2392
4
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2392
5
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6805
6
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7118
7
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7119
8
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7120
9
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7121
10
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7122
11
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7124
12
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7125
13
https://bugzilla.redhat.com/show_bug.cgi?id=824411
14
http://www.openwall.com/lists/oss-security/2012/05/23/17
16
Wireshark 1.4.x before 1.4.13 and 1.6.x before 1.6.8 allows remote
17
attackers to cause a denial of service (infinite loop) via vectors related
18
to the (1) ANSI MAP, (2) ASF, (3) IEEE 802.11, (4) IEEE 802.3, and (5) LTP
22
jdstrand: Per Debian, not suitable for code injection
25
Discovered-by: Laurent Butti
29
upstream_wireshark: released (1.4.13, 1.6.8-1)
30
hardy_wireshark: ignored (reached end-of-life)
31
lucid_wireshark: not-affected (1.2.7-1)
32
natty_wireshark: ignored (reached end-of-life)
33
oneiric_wireshark: ignored (reached end-of-life)
34
precise_wireshark: ignored (reached end-of-life)
35
precise/esm_wireshark: DNE (precise was needed)
36
quantal_wireshark: not-affected (1.6.8-1)
37
raring_wireshark: not-affected (1.6.8-1)
38
saucy_wireshark: not-affected (1.6.8-1)
39
trusty_wireshark: not-affected (1.6.8-1)
40
utopic_wireshark: not-affected (1.6.8-1)
41
vivid_wireshark: not-affected (1.6.8-1)
42
vivid/stable-phone-overlay_wireshark: DNE
43
vivid/ubuntu-core_wireshark: DNE
44
wily_wireshark: not-affected (1.6.8-1)
45
xenial_wireshark: not-affected (1.6.8-1)
46
yakkety_wireshark: not-affected (1.6.8-1)
47
zesty_wireshark: not-affected (1.6.8-1)
48
devel_wireshark: not-affected (1.6.8-1)