From Huzaifa Sidhpurwala of Red Hat Security Response Team:
authorgerald <gerald@f5534014-38df-0310-8fa8-9805f1628bb7>
Fri, 21 Oct 2011 19:07:42 +0000 (19:07 +0000)
committergerald <gerald@f5534014-38df-0310-8fa8-9805f1628bb7>
Fri, 21 Oct 2011 19:07:42 +0000 (19:07 +0000)
commit641e204065495417a9a6af072c310ceb4e235b39
tree28a5cc4b0b9333e7653ef673861943f296b4177e
parent32eede9fbdb149625e2bec02e0235ae8d07e8832
From Huzaifa Sidhpurwala of Red Hat Security Response Team:

I found a heap-based buffer overflow, when parsing ERF file format.
The overflow seems to be controlled by the values read from the file,
and hence seems exploitable to me.

git-svn-id: http://anonsvn.wireshark.org/wireshark/trunk@39508 f5534014-38df-0310-8fa8-9805f1628bb7
wiretap/erf.c