The dissect_zcl_pwr_prof_pwrprofstatersp function in epan/dissectors/packet-zbee-zcl-general.c in the ZigBee ZCL dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the Total Profile Number field, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet.
Version | Base score | Base severity | Vector |
---|
Hyperlink | Resource Type |
---|
The dissect_zcl_pwr_prof_pwrprofstatersp function in epan/dissectors/packet-zbee-zcl-general.c in the ZigBee ZCL dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the Total Profile Number field, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet.
Type | CWE ID | Description |
---|---|---|
text | N/A | n/a |
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Hyperlink | Resource |
---|---|
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11830 | x_refsource_CONFIRM |
http://www.securityfocus.com/bid/79382 | vdb-entry x_refsource_BID |
http://www.debian.org/security/2016/dsa-3505 | vendor-advisory x_refsource_DEBIAN |
http://www.wireshark.org/security/wnpa-sec-2015-50.html | x_refsource_CONFIRM |
https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=9352616ec9742f2ed3d2802d0c8c100d51ca410b | x_refsource_CONFIRM |
https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=eb0c034f6e4cdbf5ae36dd9ba8e2743630b7bd38 | x_refsource_CONFIRM |
https://security.gentoo.org/glsa/201604-05 | vendor-advisory x_refsource_GENTOO |
http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html | x_refsource_CONFIRM |
http://www.securitytracker.com/id/1034551 | vdb-entry x_refsource_SECTRACK |
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Hyperlink | Resource |
---|---|
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11830 | x_refsource_CONFIRM x_transferred |
http://www.securityfocus.com/bid/79382 | vdb-entry x_refsource_BID x_transferred |
http://www.debian.org/security/2016/dsa-3505 | vendor-advisory x_refsource_DEBIAN x_transferred |
http://www.wireshark.org/security/wnpa-sec-2015-50.html | x_refsource_CONFIRM x_transferred |
https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=9352616ec9742f2ed3d2802d0c8c100d51ca410b | x_refsource_CONFIRM x_transferred |
https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=eb0c034f6e4cdbf5ae36dd9ba8e2743630b7bd38 | x_refsource_CONFIRM x_transferred |
https://security.gentoo.org/glsa/201604-05 | vendor-advisory x_refsource_GENTOO x_transferred |
http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html | x_refsource_CONFIRM x_transferred |
http://www.securitytracker.com/id/1034551 | vdb-entry x_refsource_SECTRACK x_transferred |
The dissect_zcl_pwr_prof_pwrprofstatersp function in epan/dissectors/packet-zbee-zcl-general.c in the ZigBee ZCL dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the Total Profile Number field, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet.
Date Added | Due Date | Vulnerability Name | Required Action |
---|---|---|---|
N/A |
Type | Version | Base score | Base severity | Vector |
---|---|---|---|---|
Primary | 3.0 | 5.5 | MEDIUM | CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H |
Primary | 2.0 | 4.3 | MEDIUM | AV:N/AC:M/Au:N/C:N/I:N/A:P |