Unrated severityNVD Advisory· Published Feb 8, 2011· Updated Apr 29, 2026
CVE-2011-0538
CVE-2011-0538
Description
Wireshark 1.2.0 through 1.2.14, 1.4.0 through 1.4.3, and 1.5.0 frees an uninitialized pointer during processing of a .pcap file in the pcap-ng format, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a malformed file.
Affected products
20cpe:2.3:a:wireshark:wireshark:1.2.0:*:*:*:*:*:*:*+ 19 more
- cpe:2.3:a:wireshark:wireshark:1.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.2.10:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.2.11:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.2.12:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.2.13:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.2.14:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.2.3:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.2.4:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.2.5:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.2.6:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.2.7:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.2.8:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.2.9:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.4.0:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.4.2:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.4.3:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.5.0:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
26- openwall.com/lists/oss-security/2011/02/04/1nvdPatch
- www.securityfocus.com/bid/46167nvdExploit
- bugs.wireshark.org/bugzilla/show_bug.cginvdExploitPatch
- secunia.com/advisories/43759nvdVendor Advisory
- secunia.com/advisories/43795nvdVendor Advisory
- secunia.com/advisories/43821nvdVendor Advisory
- www.redhat.com/support/errata/RHSA-2011-0369.htmlnvdVendor Advisory
- www.redhat.com/support/errata/RHSA-2011-0370.htmlnvdVendor Advisory
- www.vupen.com/english/advisories/2011/0622nvdVendor Advisory
- www.vupen.com/english/advisories/2011/0626nvdVendor Advisory
- www.vupen.com/english/advisories/2011/0719nvdVendor Advisory
- www.vupen.com/english/advisories/2011/0747nvdVendor Advisory
- www.kb.cert.org/vuls/id/215900nvdUS Government Resource
- lists.fedoraproject.org/pipermail/package-announce/2011-March/055364.htmlnvd
- lists.fedoraproject.org/pipermail/package-announce/2011-March/055650.htmlnvd
- lists.fedoraproject.org/pipermail/package-announce/2011-March/055664.htmlnvd
- www.debian.org/security/2011/dsa-2201nvd
- www.mandriva.com/security/advisoriesnvd
- www.securitytracker.com/idnvd
- www.wireshark.org/docs/relnotes/wireshark-1.2.15.htmlnvd
- www.wireshark.org/docs/relnotes/wireshark-1.4.4.htmlnvd
- www.wireshark.org/security/wnpa-sec-2011-03.htmlnvd
- www.wireshark.org/security/wnpa-sec-2011-04.htmlnvd
- bugzilla.redhat.com/show_bug.cginvd
- exchange.xforce.ibmcloud.com/vulnerabilities/65182nvd
- oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14605nvd
News mentions
0No linked articles in our index yet.