1
Candidate: CVE-2012-6061
4
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6061
5
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=7869
6
http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-wtp.c?r1=45614&r2=45613&pathrev=45614
7
http://www.wireshark.org/security/wnpa-sec-2012-37.html
8
http://anonsvn.wireshark.org/viewvc?view=revision&revision=45614
10
The dissect_wtp_common function in epan/dissectors/packet-wtp.c in the WTP
11
dissector in Wireshark 1.6.x before 1.6.12 and 1.8.x before 1.8.4 uses an
12
incorrect data type for a certain length field, which allows remote
13
attackers to cause a denial of service (integer overflow and infinite loop)
14
via a crafted value in a packet.
23
upstream_wireshark: released (1.6.12,1.8.4)
24
hardy_wireshark: ignored (reached end-of-life)
25
lucid_wireshark: ignored (reached end-of-life)
26
oneiric_wireshark: ignored (reached end-of-life)
27
precise_wireshark: ignored (reached end-of-life)
28
precise/esm_wireshark: DNE (precise was needed)
29
quantal_wireshark: ignored (reached end-of-life)
30
raring_wireshark: ignored (reached end-of-life)
31
saucy_wireshark: ignored (reached end-of-life)
32
trusty_wireshark: not-affected (1.10.6-1)
33
utopic_wireshark: not-affected (1.12.0+git+4fab41a1-1)
34
vivid_wireshark: not-affected (1.12.1+g01b65bf-2)
35
vivid/stable-phone-overlay_wireshark: DNE
36
vivid/ubuntu-core_wireshark: DNE
37
wily_wireshark: not-affected (1.12.1+g01b65bf-2)
38
xenial_wireshark: not-affected (1.12.1+g01b65bf-2)
39
yakkety_wireshark: not-affected (1.12.1+g01b65bf-2)
40
zesty_wireshark: not-affected (1.12.1+g01b65bf-2)
41
devel_wireshark: not-affected (1.12.1+g01b65bf-2)