ANNOUNCEMENT: Live Wireshark University & Allegro Packets online APAC Wireshark Training Session
April 17th, 2024 | 14:30-16:00 SGT (UTC+8) | Online

Wireshark-bugs: [Wireshark-bugs] [Bug 3382] New: Format string overflow in PROFINET

Date: Wed, 1 Apr 2009 13:51:37 -0700 (PDT)
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=3382

           Summary: Format string overflow in PROFINET
           Product: Wireshark
           Version: 1.0.6
          Platform: Other
        OS/Version: All
            Status: NEW
          Severity: Blocker
          Priority: High
         Component: Wireshark
        AssignedTo: wireshark-bugs@xxxxxxxxxxxxx
        ReportedBy: gerald@xxxxxxxxxxxxx


Build Information:
Paste the COMPLETE build information from "Help->About Wireshark", "wireshark
-v", or "tshark -v".
--
The PROFINET dissector in 1.0.x is susceptible to a format string overflow, as
described at http://securitytracker.com/alerts/2009/Mar/1021957.html. Attached
is a capture file that demonstrates the flaw.

This was fixed in the 1.1 branch in r26652.


-- 
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.