CVE-2012-4289

low

Vulnerable Software

Configuration 1

OR

cpe:2.3:a:wireshark:wireshark:1.8.0:*:*:*:*:*:*:*

cpe:2.3:a:wireshark:wireshark:1.8.1:*:*:*:*:*:*:*

Configuration 2

OR

cpe:2.3:a:wireshark:wireshark:1.6.0:*:*:*:*:*:*:*

cpe:2.3:a:wireshark:wireshark:1.6.1:*:*:*:*:*:*:*

cpe:2.3:a:wireshark:wireshark:1.6.2:*:*:*:*:*:*:*

cpe:2.3:a:wireshark:wireshark:1.6.3:*:*:*:*:*:*:*

cpe:2.3:a:wireshark:wireshark:1.6.4:*:*:*:*:*:*:*

cpe:2.3:a:wireshark:wireshark:1.6.5:*:*:*:*:*:*:*

cpe:2.3:a:wireshark:wireshark:1.6.6:*:*:*:*:*:*:*

cpe:2.3:a:wireshark:wireshark:1.6.7:*:*:*:*:*:*:*

cpe:2.3:a:wireshark:wireshark:1.6.8:*:*:*:*:*:*:*

cpe:2.3:a:wireshark:wireshark:1.6.9:*:*:*:*:*:*:*

Configuration 3

OR

cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*

cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux:5:*:*:*:*:*:*:*

cpe:2.3:o:sun:sunos:5.11:*:*:*:*:*:*:*

Configuration 4

OR

cpe:2.3:a:wireshark:wireshark:1.4.0:*:*:*:*:*:*:*

cpe:2.3:a:wireshark:wireshark:1.4.1:*:*:*:*:*:*:*

cpe:2.3:a:wireshark:wireshark:1.4.2:*:*:*:*:*:*:*

cpe:2.3:a:wireshark:wireshark:1.4.3:*:*:*:*:*:*:*

cpe:2.3:a:wireshark:wireshark:1.4.4:*:*:*:*:*:*:*

cpe:2.3:a:wireshark:wireshark:1.4.5:*:*:*:*:*:*:*

cpe:2.3:a:wireshark:wireshark:1.4.6:*:*:*:*:*:*:*

cpe:2.3:a:wireshark:wireshark:1.4.7:*:*:*:*:*:*:*

cpe:2.3:a:wireshark:wireshark:1.4.8:*:*:*:*:*:*:*

cpe:2.3:a:wireshark:wireshark:1.4.9:*:*:*:*:*:*:*

cpe:2.3:a:wireshark:wireshark:1.4.10:*:*:*:*:*:*:*

cpe:2.3:a:wireshark:wireshark:1.4.11:*:*:*:*:*:*:*

cpe:2.3:a:wireshark:wireshark:1.4.12:*:*:*:*:*:*:*

cpe:2.3:a:wireshark:wireshark:1.4.13:*:*:*:*:*:*:*

cpe:2.3:a:wireshark:wireshark:1.4.14:*:*:*:*:*:*:*