CVE
- Id
- 47122
- CVE No.
- CVE-2010-4538
- Status
- Candidate
- Description
- Buffer overflow in the sect_enttec_dmx_da function in epan/dissectors/packet-enttec.c in Wireshark 1.4.2 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted ENTTEC DMX packet with Run Length Encoding (RLE) compression.
- Phase
- Assigned (20101209)
- Votes
- None (candidate not yet proposed)
- Comments
Related CVE References
Id | CVE Id | CVE No. | Reference | Actions |
---|---|---|---|---|
515365 | 47122 | CVE-2010-4538 | MLIST:[oss-security] 20101231 CVE Request: Wireshark | View |
515366 | 47122 | CVE-2010-4538 | URL:http://openwall.com/lists/oss-security/2010/12/31/7 | View |
515367 | 47122 | CVE-2010-4538 | MLIST:[oss-security] 20110103 Re: CVE Request: Wireshark | View |
515368 | 47122 | CVE-2010-4538 | URL:http://openwall.com/lists/oss-security/2011/01/03/8 | View |
515369 | 47122 | CVE-2010-4538 | CONFIRM:https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5539 | View |
515370 | 47122 | CVE-2010-4538 | DEBIAN:DSA-2144 | View |
515371 | 47122 | CVE-2010-4538 | URL:http://www.debian.org/security/2011/dsa-2144 | View |
515372 | 47122 | CVE-2010-4538 | FEDORA:FEDORA-2011-0128 | View |
515373 | 47122 | CVE-2010-4538 | URL:http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053042.html | View |
515374 | 47122 | CVE-2010-4538 | FEDORA:FEDORA-2011-0167 | View |
515375 | 47122 | CVE-2010-4538 | URL:http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053061.html | View |
515376 | 47122 | CVE-2010-4538 | MANDRIVA:MDVSA-2011:002 | View |
515377 | 47122 | CVE-2010-4538 | URL:http://www.mandriva.com/security/advisories?name=MDVSA-2011:002 | View |
515378 | 47122 | CVE-2010-4538 | REDHAT:RHSA-2011:0013 | View |
515379 | 47122 | CVE-2010-4538 | URL:http://www.redhat.com/support/errata/RHSA-2011-0013.html | View |
515380 | 47122 | CVE-2010-4538 | BID:45634 | View |
515381 | 47122 | CVE-2010-4538 | URL:http://www.securityfocus.com/bid/45634 | View |
515382 | 47122 | CVE-2010-4538 | OSVDB:70244 | View |
515383 | 47122 | CVE-2010-4538 | URL:http://osvdb.org/70244 | View |
515384 | 47122 | CVE-2010-4538 | OVAL:oval:org.mitre.oval:def:14937 | View |
515385 | 47122 | CVE-2010-4538 | URL:http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:14937 | View |
515386 | 47122 | CVE-2010-4538 | SECTRACK:1024930 | View |
515387 | 47122 | CVE-2010-4538 | URL:http://www.securitytracker.com/id?1024930 | View |
515388 | 47122 | CVE-2010-4538 | SECUNIA:42767 | View |
515389 | 47122 | CVE-2010-4538 | URL:http://secunia.com/advisories/42767 | View |
515390 | 47122 | CVE-2010-4538 | SECUNIA:42853 | View |
515391 | 47122 | CVE-2010-4538 | URL:http://secunia.com/advisories/42853 | View |
515392 | 47122 | CVE-2010-4538 | SECUNIA:42914 | View |
515393 | 47122 | CVE-2010-4538 | URL:http://secunia.com/advisories/42914 | View |
515394 | 47122 | CVE-2010-4538 | SECUNIA:42910 | View |
515395 | 47122 | CVE-2010-4538 | URL:http://secunia.com/advisories/42910 | View |
515396 | 47122 | CVE-2010-4538 | VUPEN:ADV-2011-0079 | View |
515397 | 47122 | CVE-2010-4538 | URL:http://www.vupen.com/english/advisories/2011/0079 | View |
515398 | 47122 | CVE-2010-4538 | VUPEN:ADV-2011-0008 | View |
515399 | 47122 | CVE-2010-4538 | URL:http://www.vupen.com/english/advisories/2011/0008 | View |
515400 | 47122 | CVE-2010-4538 | VUPEN:ADV-2011-0053 | View |
515401 | 47122 | CVE-2010-4538 | URL:http://www.vupen.com/english/advisories/2011/0053 | View |
515402 | 47122 | CVE-2010-4538 | VUPEN:ADV-2011-0069 | View |
515403 | 47122 | CVE-2010-4538 | URL:http://www.vupen.com/english/advisories/2011/0069 | View |
515404 | 47122 | CVE-2010-4538 | VUPEN:ADV-2011-0099 | View |
515405 | 47122 | CVE-2010-4538 | URL:http://www.vupen.com/english/advisories/2011/0099 | View |
515406 | 47122 | CVE-2010-4538 | VUPEN:ADV-2011-0110 | View |
Related JVN
Id | JVN No. | Title | Summary | CVE No. | CVE Id | CVSS_v2 | CVSS_v3 | JVN URL | Actions |
---|---|---|---|---|---|---|---|---|---|
31456 | JVNDB-2011-001696 | GIMP の GFIG プラグインにおけるスタックベースのバッファオーバーフローの脆弱性 | GIMP の GFIG プラグインの plug-ins/gfig/gfig-style.c 内にある gfig_read_parameter_gimp_rgb 関数には、スタックベースのバッファオーバーフローの脆弱性が存在します。 | CVE-2010-4542 | 47122 | 6.8 | http://jvndb.jvn.jp/ja/contents/2011/JVNDB-2011-001696.html | View |