The pcapng_read_if_descr_block function in wiretap/pcapng.c in the pcapng parser in Wireshark 1.12.x before 1.12.8 uses too many levels of pointer indirection, which allows remote attackers to cause a denial of service (incorrect free and application crash) via a crafted packet that triggers interface-filter copying.
Version | Base score | Base severity | Vector |
---|
Hyperlink | Resource Type |
---|
The pcapng_read_if_descr_block function in wiretap/pcapng.c in the pcapng parser in Wireshark 1.12.x before 1.12.8 uses too many levels of pointer indirection, which allows remote attackers to cause a denial of service (incorrect free and application crash) via a crafted packet that triggers interface-filter copying.
Type | CWE ID | Description |
---|---|---|
text | N/A | n/a |
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Hyperlink | Resource |
---|---|
http://www.securityfocus.com/bid/77101 | vdb-entry x_refsource_BID |
http://www.securityfocus.com/bid/78723 | vdb-entry x_refsource_BID |
https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=72497918b16b706c3ba75e1f731f58b802ca14d1 | x_refsource_CONFIRM |
http://www.debian.org/security/2016/dsa-3505 | vendor-advisory x_refsource_DEBIAN |
http://www.securitytracker.com/id/1033953 | vdb-entry x_refsource_SECTRACK |
http://www.wireshark.org/security/wnpa-sec-2015-30.html | x_refsource_CONFIRM |
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11455 | x_refsource_CONFIRM |
http://lists.opensuse.org/opensuse-updates/2015-10/msg00053.html | vendor-advisory x_refsource_SUSE |
http://www.zerodayinitiative.com/advisories/ZDI-15-624 | x_refsource_MISC |
http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html | x_refsource_CONFIRM |
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Hyperlink | Resource |
---|---|
http://www.securityfocus.com/bid/77101 | vdb-entry x_refsource_BID x_transferred |
http://www.securityfocus.com/bid/78723 | vdb-entry x_refsource_BID x_transferred |
https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=72497918b16b706c3ba75e1f731f58b802ca14d1 | x_refsource_CONFIRM x_transferred |
http://www.debian.org/security/2016/dsa-3505 | vendor-advisory x_refsource_DEBIAN x_transferred |
http://www.securitytracker.com/id/1033953 | vdb-entry x_refsource_SECTRACK x_transferred |
http://www.wireshark.org/security/wnpa-sec-2015-30.html | x_refsource_CONFIRM x_transferred |
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11455 | x_refsource_CONFIRM x_transferred |
http://lists.opensuse.org/opensuse-updates/2015-10/msg00053.html | vendor-advisory x_refsource_SUSE x_transferred |
http://www.zerodayinitiative.com/advisories/ZDI-15-624 | x_refsource_MISC x_transferred |
http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html | x_refsource_CONFIRM x_transferred |
The pcapng_read_if_descr_block function in wiretap/pcapng.c in the pcapng parser in Wireshark 1.12.x before 1.12.8 uses too many levels of pointer indirection, which allows remote attackers to cause a denial of service (incorrect free and application crash) via a crafted packet that triggers interface-filter copying.
Date Added | Due Date | Vulnerability Name | Required Action |
---|---|---|---|
N/A |
Type | Version | Base score | Base severity | Vector |
---|---|---|---|---|
Primary | 2.0 | 4.3 | MEDIUM | AV:N/AC:M/Au:N/C:N/I:N/A:P |