Hide Forgot
Common Vulnerabilities and Exposures assigned an identifier CVE-2013-4928 to the following vulnerability: Integer signedness error in the dissect_headers function in epan/dissectors/packet-btobex.c in the Bluetooth OBEX dissector in Wireshark 1.10.x before 1.10.1 allows remote attackers to cause a denial of service (infinite loop) via a crafted packet. References: [1] http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-btobex.c?r1=50258&r2=50257&pathrev=50258 [2] http://anonsvn.wireshark.org/viewvc?view=revision&revision=50258 [3] http://www.wireshark.org/docs/relnotes/wireshark-1.10.1.html [4] https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=8875 [5] https://www.wireshark.org/security/wnpa-sec-2013-46.html
Created wireshark tracking bugs for this issue: Affects: fedora-18 [bug 990189]
Statement: Not Vulnerable. This issue does not affect the version of wireshark, as shipped with Red Hat Enterprise Linux 5 and 6.
wireshark-1.10.1-1.fc19 has been pushed to the Fedora 19 stable repository. If problems still persist, please make note of it in this bug report.
wireshark-1.10.2-6.fc19 has been pushed to the Fedora 19 stable repository. If problems still persist, please make note of it in this bug report.
wireshark-1.10.2-7.fc20 has been pushed to the Fedora 20 stable repository. If problems still persist, please make note of it in this bug report.
wireshark-1.10.2-4.fc18 has been pushed to the Fedora 18 stable repository. If problems still persist, please make note of it in this bug report.