diff options
author | gerald <gerald@f5534014-38df-0310-8fa8-9805f1628bb7> | 2011-10-21 19:07:42 +0000 |
---|---|---|
committer | gerald <gerald@f5534014-38df-0310-8fa8-9805f1628bb7> | 2011-10-21 19:07:42 +0000 |
commit | 641e204065495417a9a6af072c310ceb4e235b39 (patch) | |
tree | 28a5cc4b0b9333e7653ef673861943f296b4177e /globals.h | |
parent | 32eede9fbdb149625e2bec02e0235ae8d07e8832 (diff) |
From Huzaifa Sidhpurwala of Red Hat Security Response Team:
I found a heap-based buffer overflow, when parsing ERF file format.
The overflow seems to be controlled by the values read from the file,
and hence seems exploitable to me.
git-svn-id: http://anonsvn.wireshark.org/wireshark/trunk@39508 f5534014-38df-0310-8fa8-9805f1628bb7
Diffstat (limited to 'globals.h')
0 files changed, 0 insertions, 0 deletions