Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2010-4538
Deferred
More InfoOfficial Page
Source-secalert@redhat.com
View Known Exploited Vulnerability (KEV) details
Published At-07 Jan, 2011 | 19:00
Updated At-11 Apr, 2025 | 00:51

Buffer overflow in the sect_enttec_dmx_da function in epan/dissectors/packet-enttec.c in Wireshark 1.4.2 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted ENTTEC DMX packet with Run Length Encoding (RLE) compression.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary2.09.3HIGH
AV:N/AC:M/Au:N/C:C/I:C/A:C
Primary2.09.3HIGH
AV:N/AC:M/Au:N/C:C/I:C/A:C
CPE Matches

Wireshark Foundation
wireshark
>>wireshark>>1.4.2
cpe:2.3:a:wireshark:wireshark:1.4.2:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-119Primarynvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053042.htmlsecalert@redhat.com
N/A
http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053061.htmlsecalert@redhat.com
N/A
http://openwall.com/lists/oss-security/2010/12/31/7secalert@redhat.com
N/A
http://openwall.com/lists/oss-security/2011/01/03/8secalert@redhat.com
N/A
http://osvdb.org/70244secalert@redhat.com
N/A
http://secunia.com/advisories/42767secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/42853secalert@redhat.com
N/A
http://secunia.com/advisories/42910secalert@redhat.com
N/A
http://secunia.com/advisories/42914secalert@redhat.com
N/A
http://www.debian.org/security/2011/dsa-2144secalert@redhat.com
N/A
http://www.mandriva.com/security/advisories?name=MDVSA-2011:002secalert@redhat.com
N/A
http://www.redhat.com/support/errata/RHSA-2011-0013.htmlsecalert@redhat.com
N/A
http://www.securityfocus.com/bid/45634secalert@redhat.com
N/A
http://www.securitytracker.com/id?1024930secalert@redhat.com
N/A
http://www.vupen.com/english/advisories/2011/0008secalert@redhat.com
N/A
http://www.vupen.com/english/advisories/2011/0053secalert@redhat.com
N/A
http://www.vupen.com/english/advisories/2011/0069secalert@redhat.com
N/A
http://www.vupen.com/english/advisories/2011/0079secalert@redhat.com
N/A
http://www.vupen.com/english/advisories/2011/0099secalert@redhat.com
N/A
http://www.vupen.com/english/advisories/2011/0110secalert@redhat.com
N/A
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5539secalert@redhat.com
Exploit
Patch
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14937secalert@redhat.com
N/A
http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053042.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053061.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://openwall.com/lists/oss-security/2010/12/31/7af854a3a-2127-422b-91ae-364da2661108
N/A
http://openwall.com/lists/oss-security/2011/01/03/8af854a3a-2127-422b-91ae-364da2661108
N/A
http://osvdb.org/70244af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/42767af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/42853af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/42910af854a3a-2127-422b-91ae-364da2661108
N/A
http://secunia.com/advisories/42914af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.debian.org/security/2011/dsa-2144af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.mandriva.com/security/advisories?name=MDVSA-2011:002af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.redhat.com/support/errata/RHSA-2011-0013.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
http://www.securityfocus.com/bid/45634af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.securitytracker.com/id?1024930af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.vupen.com/english/advisories/2011/0008af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.vupen.com/english/advisories/2011/0053af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.vupen.com/english/advisories/2011/0069af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.vupen.com/english/advisories/2011/0079af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.vupen.com/english/advisories/2011/0099af854a3a-2127-422b-91ae-364da2661108
N/A
http://www.vupen.com/english/advisories/2011/0110af854a3a-2127-422b-91ae-364da2661108
N/A
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=5539af854a3a-2127-422b-91ae-364da2661108
Exploit
Patch
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14937af854a3a-2127-422b-91ae-364da2661108
N/A
Change History
0Changes found

Details not found