The dissect_wccp2r1_address_table_info function in epan/dissectors/packet-wccp.c in the WCCP dissector in Wireshark 1.12.x before 1.12.6 does not properly determine whether enough memory is available for storing IP address strings, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
Version | Base score | Base severity | Vector |
---|
Hyperlink | Resource Type |
---|
The dissect_wccp2r1_address_table_info function in epan/dissectors/packet-wccp.c in the WCCP dissector in Wireshark 1.12.x before 1.12.6 does not properly determine whether enough memory is available for storing IP address strings, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
Type | CWE ID | Description |
---|---|---|
text | N/A | n/a |
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Hyperlink | Resource |
---|---|
https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=524ed1df6e6126cd63ba419ccb82c83636d77ee4 | x_refsource_CONFIRM |
http://www.securityfocus.com/bid/75317 | vdb-entry x_refsource_BID |
http://www.debian.org/security/2015/dsa-3294 | vendor-advisory x_refsource_DEBIAN |
http://lists.opensuse.org/opensuse-updates/2015-07/msg00020.html | vendor-advisory x_refsource_SUSE |
http://www.securitytracker.com/id/1032662 | vdb-entry x_refsource_SECTRACK |
http://www.wireshark.org/security/wnpa-sec-2015-19.html | x_refsource_CONFIRM |
https://security.gentoo.org/glsa/201510-03 | vendor-advisory x_refsource_GENTOO |
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11153 | x_refsource_CONFIRM |
http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html | x_refsource_CONFIRM |
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Hyperlink | Resource |
---|---|
https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=524ed1df6e6126cd63ba419ccb82c83636d77ee4 | x_refsource_CONFIRM x_transferred |
http://www.securityfocus.com/bid/75317 | vdb-entry x_refsource_BID x_transferred |
http://www.debian.org/security/2015/dsa-3294 | vendor-advisory x_refsource_DEBIAN x_transferred |
http://lists.opensuse.org/opensuse-updates/2015-07/msg00020.html | vendor-advisory x_refsource_SUSE x_transferred |
http://www.securitytracker.com/id/1032662 | vdb-entry x_refsource_SECTRACK x_transferred |
http://www.wireshark.org/security/wnpa-sec-2015-19.html | x_refsource_CONFIRM x_transferred |
https://security.gentoo.org/glsa/201510-03 | vendor-advisory x_refsource_GENTOO x_transferred |
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11153 | x_refsource_CONFIRM x_transferred |
http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html | x_refsource_CONFIRM x_transferred |
The dissect_wccp2r1_address_table_info function in epan/dissectors/packet-wccp.c in the WCCP dissector in Wireshark 1.12.x before 1.12.6 does not properly determine whether enough memory is available for storing IP address strings, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
Date Added | Due Date | Vulnerability Name | Required Action |
---|---|---|---|
N/A |
Type | Version | Base score | Base severity | Vector |
---|---|---|---|---|
Primary | 2.0 | 5.0 | MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |