https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=3382
Summary: Format string overflow in PROFINET
Product: Wireshark
Version: 1.0.6
Platform: Other
OS/Version: All
Status: NEW
Severity: Blocker
Priority: High
Component: Wireshark
AssignedTo: wireshark-bugs@xxxxxxxxxxxxx
ReportedBy: gerald@xxxxxxxxxxxxx
Build Information:
Paste the COMPLETE build information from "Help->About Wireshark", "wireshark
-v", or "tshark -v".
--
The PROFINET dissector in 1.0.x is susceptible to a format string overflow, as
described at http://securitytracker.com/alerts/2009/Mar/1021957.html. Attached
is a capture file that demonstrates the flaw.
This was fixed in the 1.1 branch in r26652.
--
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.