Buffer overflow vulnerability in Wireshark

It may be possible to make Wireshark crash or execute malicious code by convincing someone to read a malformed packet trace file. The latest version of Wireshark (1.8.13) is not vulnerable to these issues, therefore it is recommended to upgrade to versions 1.10.6, 1.8.13 or later.

Read the Security Advisory here – http://www.wireshark.org/security/wnpa-sec-2014-04.html

About The Author

Leave a Comment

Your email address will not be published. Required fields are marked *

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Scroll to Top