ALT-PU-2016-2098-1
Closed vulnerabilities
Modified: 2024-11-21
CVE-2016-4006
epan/proto.c in Wireshark 1.12.x before 1.12.11 and 2.0.x before 2.0.3 does not limit the protocol-tree depth, which allows remote attackers to cause a denial of service (stack memory consumption and application crash) via a crafted packet.
- DSA-3585
- DSA-3585
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- 1035685
- 1035685
- http://www.wireshark.org/security/wnpa-sec-2016-25.html
- http://www.wireshark.org/security/wnpa-sec-2016-25.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12268
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12268
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=8dc9551e1d56290e6f7f02cc38b77e1d211fd4a5
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=8dc9551e1d56290e6f7f02cc38b77e1d211fd4a5
Modified: 2024-11-21
CVE-2016-4076
epan/dissectors/packet-ncp2222.inc in the NCP dissector in Wireshark 2.0.x before 2.0.3 does not properly initialize memory for search patterns, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
- 1035685
- 1035685
- http://www.wireshark.org/security/wnpa-sec-2016-19.html
- http://www.wireshark.org/security/wnpa-sec-2016-19.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11591
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11591
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=ea8e6955fcff21333c203bc00f69d5025761459b
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=ea8e6955fcff21333c203bc00f69d5025761459b
Modified: 2024-11-21
CVE-2016-4077
epan/reassemble.c in TShark in Wireshark 2.0.x before 2.0.3 relies on incorrect special-case handling of truncated Tvb data structures, which allows remote attackers to cause a denial of service (use-after-free and application crash) via a crafted packet.
- 1035685
- 1035685
- http://www.wireshark.org/security/wnpa-sec-2016-20.html
- http://www.wireshark.org/security/wnpa-sec-2016-20.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11799
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11799
- https://code.google.com/p/google-security-research/issues/detail?id=651
- https://code.google.com/p/google-security-research/issues/detail?id=651
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=c5b2c1e8f40cee913bd70fcc00284483b3c92fcd
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=c5b2c1e8f40cee913bd70fcc00284483b3c92fcd
Modified: 2024-11-21
CVE-2016-4078
The IEEE 802.11 dissector in Wireshark 1.12.x before 1.12.11 and 2.0.x before 2.0.3 does not properly restrict element lists, which allows remote attackers to cause a denial of service (deep recursion and application crash) via a crafted packet, related to epan/dissectors/packet-capwap.c and epan/dissectors/packet-ieee80211.c.
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- 1035685
- 1035685
- http://www.wireshark.org/security/wnpa-sec-2016-21.html
- http://www.wireshark.org/security/wnpa-sec-2016-21.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11824
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11824
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12187
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12187
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=e2745d741ec11f395d41c0aafa24df9dec136399
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=e2745d741ec11f395d41c0aafa24df9dec136399
Modified: 2024-11-21
CVE-2016-4079
epan/dissectors/packet-pktc.c in the PKTC dissector in Wireshark 1.12.x before 1.12.11 and 2.0.x before 2.0.3 does not verify BER identifiers, which allows remote attackers to cause a denial of service (out-of-bounds write and application crash) via a crafted packet.
- DSA-3585
- DSA-3585
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- 1035685
- 1035685
- http://www.wireshark.org/security/wnpa-sec-2016-22.html
- http://www.wireshark.org/security/wnpa-sec-2016-22.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12206
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12206
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=4cdc9eeba58f866bd5f273e9c5b3876857a7a4bf
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=4cdc9eeba58f866bd5f273e9c5b3876857a7a4bf
Modified: 2024-11-21
CVE-2016-4080
epan/dissectors/packet-pktc.c in the PKTC dissector in Wireshark 1.12.x before 1.12.11 and 2.0.x before 2.0.3 misparses timestamp fields, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet.
- DSA-3585
- DSA-3585
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- 1035685
- 1035685
- http://www.wireshark.org/security/wnpa-sec-2016-23.html
- http://www.wireshark.org/security/wnpa-sec-2016-23.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12242
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12242
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=ad097385c05c370440fb810e67f811398efc0ea0
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=ad097385c05c370440fb810e67f811398efc0ea0
Modified: 2024-11-21
CVE-2016-4081
epan/dissectors/packet-iax2.c in the IAX2 dissector in Wireshark 1.12.x before 1.12.11 and 2.0.x before 2.0.3 uses an incorrect integer data type, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
- DSA-3585
- DSA-3585
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- 1035685
- 1035685
- http://www.wireshark.org/security/wnpa-sec-2016-24.html
- http://www.wireshark.org/security/wnpa-sec-2016-24.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12260
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12260
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=42f299be6abb302f32cec78b1c0812364c9f9285
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=42f299be6abb302f32cec78b1c0812364c9f9285
Modified: 2024-11-21
CVE-2016-4082
epan/dissectors/packet-gsm_cbch.c in the GSM CBCH dissector in Wireshark 1.12.x before 1.12.11 and 2.0.x before 2.0.3 uses the wrong variable to index an array, which allows remote attackers to cause a denial of service (out-of-bounds access and application crash) via a crafted packet.
- DSA-3585
- DSA-3585
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- 1035685
- 1035685
- http://www.wireshark.org/security/wnpa-sec-2016-26.html
- http://www.wireshark.org/security/wnpa-sec-2016-26.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12278
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12278
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=0fe522dfc689c3ebd119f2a6775d1f275c5f04d8
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=0fe522dfc689c3ebd119f2a6775d1f275c5f04d8
Modified: 2024-11-21
CVE-2016-4083
epan/dissectors/packet-mswsp.c in the MS-WSP dissector in Wireshark 2.0.x before 2.0.3 does not ensure that data is available before array allocation, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
- 1035685
- 1035685
- http://www.wireshark.org/security/wnpa-sec-2016-27.html
- http://www.wireshark.org/security/wnpa-sec-2016-27.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12341
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12341
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=66417b17b3570b163a16ca81f71ce5bcb10548d2
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=66417b17b3570b163a16ca81f71ce5bcb10548d2
Modified: 2024-11-21
CVE-2016-4084
Integer signedness error in epan/dissectors/packet-mswsp.c in the MS-WSP dissector in Wireshark 2.0.x before 2.0.3 allows remote attackers to cause a denial of service (integer overflow and application crash) via a crafted packet that triggers an unexpected array size.
- 1035685
- 1035685
- http://www.wireshark.org/security/wnpa-sec-2016-27.html
- http://www.wireshark.org/security/wnpa-sec-2016-27.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12341
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12341
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=66417b17b3570b163a16ca81f71ce5bcb10548d2
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=66417b17b3570b163a16ca81f71ce5bcb10548d2
Modified: 2024-11-21
CVE-2016-4085
Stack-based buffer overflow in epan/dissectors/packet-ncp2222.inc in the NCP dissector in Wireshark 1.12.x before 1.12.11 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a long string in a packet.
- DSA-3585
- DSA-3585
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 87467
- 87467
- 1035685
- 1035685
- http://www.wireshark.org/security/wnpa-sec-2016-28.html
- http://www.wireshark.org/security/wnpa-sec-2016-28.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12293
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12293
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=99efcb0f5aeeb4b2179e88c7a4233022aaeecf0b
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=99efcb0f5aeeb4b2179e88c7a4233022aaeecf0b
Modified: 2024-11-21
CVE-2016-5350
epan/dissectors/packet-dcerpc-spoolss.c in the SPOOLS component in Wireshark 1.12.x before 1.12.12 and 2.x before 2.0.4 mishandles unexpected offsets, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
- DSA-3615
- DSA-3615
- [oss-security] 20160609 Re: CVE Request: wireshark releases
- [oss-security] 20160609 Re: CVE Request: wireshark releases
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- 91140
- 91140
- https://github.com/wireshark/wireshark/commit/b4d16b4495b732888e12baf5b8a7e9bf2665e22b
- https://github.com/wireshark/wireshark/commit/b4d16b4495b732888e12baf5b8a7e9bf2665e22b
- https://www.wireshark.org/security/wnpa-sec-2016-29.html
- https://www.wireshark.org/security/wnpa-sec-2016-29.html
Modified: 2024-11-21
CVE-2016-5351
epan/crypt/airpdcap.c in the IEEE 802.11 dissector in Wireshark 1.12.x before 1.12.12 and 2.x before 2.0.4 mishandles the lack of an EAPOL_RSN_KEY, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
- DSA-3615
- DSA-3615
- [oss-security] 20160609 Re: CVE Request: wireshark releases
- [oss-security] 20160609 Re: CVE Request: wireshark releases
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- 91140
- 91140
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11585
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11585
- https://github.com/wireshark/wireshark/commit/9b0b20b8d5f8c9f7839d58ff6c5900f7e19283b4
- https://github.com/wireshark/wireshark/commit/9b0b20b8d5f8c9f7839d58ff6c5900f7e19283b4
- https://www.wireshark.org/security/wnpa-sec-2016-30.html
- https://www.wireshark.org/security/wnpa-sec-2016-30.html
Modified: 2024-11-21
CVE-2016-5352
epan/crypt/airpdcap.c in the IEEE 802.11 dissector in Wireshark 2.x before 2.0.4 mishandles certain length values, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
- [oss-security] 20160609 Re: CVE Request: wireshark releases
- [oss-security] 20160609 Re: CVE Request: wireshark releases
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- 91140
- 91140
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12175
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12175
- https://github.com/wireshark/wireshark/commit/b6d838eebf4456192360654092e5587c5207f185
- https://github.com/wireshark/wireshark/commit/b6d838eebf4456192360654092e5587c5207f185
- https://www.wireshark.org/security/wnpa-sec-2016-31.html
- https://www.wireshark.org/security/wnpa-sec-2016-31.html
Modified: 2024-11-21
CVE-2016-5353
epan/dissectors/packet-umts_fp.c in the UMTS FP dissector in Wireshark 1.12.x before 1.12.12 and 2.x before 2.0.4 mishandles the reserved C/T value, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
- DSA-3615
- DSA-3615
- [oss-security] 20160609 Re: CVE Request: wireshark releases
- [oss-security] 20160609 Re: CVE Request: wireshark releases
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- 91140
- 91140
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12191
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12191
- https://github.com/wireshark/wireshark/commit/7d7190695ce2ff269fdffb04e87139995cde21f4
- https://github.com/wireshark/wireshark/commit/7d7190695ce2ff269fdffb04e87139995cde21f4
- https://www.wireshark.org/security/wnpa-sec-2016-32.html
- https://www.wireshark.org/security/wnpa-sec-2016-32.html
Modified: 2024-11-21
CVE-2016-5354
The USB subsystem in Wireshark 1.12.x before 1.12.12 and 2.x before 2.0.4 mishandles class types, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
- DSA-3615
- DSA-3615
- [oss-security] 20160609 Re: CVE Request: wireshark releases
- [oss-security] 20160609 Re: CVE Request: wireshark releases
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- 91140
- 91140
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12356
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12356
- https://github.com/wireshark/wireshark/commit/2cb5985bf47bdc8bea78d28483ed224abdd33dc6
- https://github.com/wireshark/wireshark/commit/2cb5985bf47bdc8bea78d28483ed224abdd33dc6
- https://www.wireshark.org/security/wnpa-sec-2016-33.html
- https://www.wireshark.org/security/wnpa-sec-2016-33.html
Modified: 2024-11-21
CVE-2016-5355
wiretap/toshiba.c in the Toshiba file parser in Wireshark 1.12.x before 1.12.12 and 2.x before 2.0.4 mishandles sscanf unsigned-integer processing, which allows remote attackers to cause a denial of service (application crash) via a crafted file.
- DSA-3615
- DSA-3615
- [oss-security] 20160609 Re: CVE Request: wireshark releases
- [oss-security] 20160609 Re: CVE Request: wireshark releases
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- 91140
- 91140
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12394
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12394
- https://github.com/wireshark/wireshark/commit/3270dfac43da861c714df76513456b46765ff47f
- https://github.com/wireshark/wireshark/commit/3270dfac43da861c714df76513456b46765ff47f
- https://github.com/wireshark/wireshark/commit/5efb45231671baa2db2011d8f67f9d6e72bc455b
- https://github.com/wireshark/wireshark/commit/5efb45231671baa2db2011d8f67f9d6e72bc455b
- https://www.wireshark.org/security/wnpa-sec-2016-34.html
- https://www.wireshark.org/security/wnpa-sec-2016-34.html
Modified: 2024-11-21
CVE-2016-5356
wiretap/cosine.c in the CoSine file parser in Wireshark 1.12.x before 1.12.12 and 2.x before 2.0.4 mishandles sscanf unsigned-integer processing, which allows remote attackers to cause a denial of service (application crash) via a crafted file.
- DSA-3615
- DSA-3615
- [oss-security] 20160609 Re: CVE Request: wireshark releases
- [oss-security] 20160609 Re: CVE Request: wireshark releases
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- 91140
- 91140
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12395
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12395
- https://github.com/wireshark/wireshark/commit/a66628e425db725df1ac52a3c573a03357060ddd
- https://github.com/wireshark/wireshark/commit/a66628e425db725df1ac52a3c573a03357060ddd
- https://github.com/wireshark/wireshark/commit/f5ec0afb766f19519ea9623152cca3bbe2229500
- https://github.com/wireshark/wireshark/commit/f5ec0afb766f19519ea9623152cca3bbe2229500
- https://www.wireshark.org/security/wnpa-sec-2016-35.html
- https://www.wireshark.org/security/wnpa-sec-2016-35.html
Modified: 2024-11-21
CVE-2016-5357
wiretap/netscreen.c in the NetScreen file parser in Wireshark 1.12.x before 1.12.12 and 2.x before 2.0.4 mishandles sscanf unsigned-integer processing, which allows remote attackers to cause a denial of service (application crash) via a crafted file.
- DSA-3615
- DSA-3615
- [oss-security] 20160609 Re: CVE Request: wireshark releases
- [oss-security] 20160609 Re: CVE Request: wireshark releases
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- 91140
- 91140
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12396
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12396
- https://github.com/wireshark/wireshark/commit/11edc83b98a61e890d7bb01855389d40e984ea82
- https://github.com/wireshark/wireshark/commit/11edc83b98a61e890d7bb01855389d40e984ea82
- https://github.com/wireshark/wireshark/commit/6a140eca7b78b230f1f90a739a32257476513c78
- https://github.com/wireshark/wireshark/commit/6a140eca7b78b230f1f90a739a32257476513c78
- https://www.wireshark.org/security/wnpa-sec-2016-36.html
- https://www.wireshark.org/security/wnpa-sec-2016-36.html
Modified: 2024-11-21
CVE-2016-5358
epan/dissectors/packet-pktap.c in the Ethernet dissector in Wireshark 2.x before 2.0.4 mishandles the packet-header data type, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
- [oss-security] 20160609 Re: CVE Request: wireshark releases
- [oss-security] 20160609 Re: CVE Request: wireshark releases
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- 91140
- 91140
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12440
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12440
- https://github.com/wireshark/wireshark/commit/2c13e97d656c1c0ac4d76eb9d307664aae0e0cf7
- https://github.com/wireshark/wireshark/commit/2c13e97d656c1c0ac4d76eb9d307664aae0e0cf7
- https://www.wireshark.org/security/wnpa-sec-2016-37.html
- https://www.wireshark.org/security/wnpa-sec-2016-37.html
Modified: 2024-11-21
CVE-2016-6503
The CORBA IDL dissectors in Wireshark 2.x before 2.0.5 on 64-bit Windows platforms do not properly interact with Visual C++ compiler options, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
- [oss-security] 20160728 CVE request: Wireshark 2.0.5 and 1.12.13 security releases
- [oss-security] 20160728 CVE request: Wireshark 2.0.5 and 1.12.13 security releases
- 92162
- 92162
- 1036480
- 1036480
- http://www.wireshark.org/security/wnpa-sec-2016-39.html
- http://www.wireshark.org/security/wnpa-sec-2016-39.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12495
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12495
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=581a17af40b84ef0c9e7f41ed0795af345b61ce1
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=581a17af40b84ef0c9e7f41ed0795af345b61ce1
- 40196
- 40196
Modified: 2024-11-21
CVE-2016-6505
epan/dissectors/packet-packetbb.c in the PacketBB dissector in Wireshark 1.12.x before 1.12.13 and 2.x before 2.0.5 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted packet.
- [oss-security] 20160728 CVE request: Wireshark 2.0.5 and 1.12.13 security releases
- [oss-security] 20160728 CVE request: Wireshark 2.0.5 and 1.12.13 security releases
- DSA-3648
- DSA-3648
- 92163
- 92163
- 1036480
- 1036480
- http://www.wireshark.org/security/wnpa-sec-2016-41.html
- http://www.wireshark.org/security/wnpa-sec-2016-41.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12577
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12577
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=94e97e45cf614c7bb8fe90c23df52910246b2c95
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=94e97e45cf614c7bb8fe90c23df52910246b2c95
- 40197
- 40197
Modified: 2024-11-21
CVE-2016-6506
epan/dissectors/packet-wsp.c in the WSP dissector in Wireshark 1.12.x before 1.12.13 and 2.x before 2.0.5 allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
- [oss-security] 20160728 CVE request: Wireshark 2.0.5 and 1.12.13 security releases
- [oss-security] 20160728 CVE request: Wireshark 2.0.5 and 1.12.13 security releases
- DSA-3648
- DSA-3648
- 1036480
- 1036480
- http://www.wireshark.org/security/wnpa-sec-2016-42.html
- http://www.wireshark.org/security/wnpa-sec-2016-42.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12594
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12594
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=a9d5256890c9189c7461bfce6ed6edce5d861499
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=a9d5256890c9189c7461bfce6ed6edce5d861499
Modified: 2024-11-21
CVE-2016-6507
epan/dissectors/packet-mmse.c in the MMSE dissector in Wireshark 1.12.x before 1.12.13 allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
- [oss-security] 20160728 CVE request: Wireshark 2.0.5 and 1.12.13 security releases
- [oss-security] 20160728 CVE request: Wireshark 2.0.5 and 1.12.13 security releases
- DSA-3648
- DSA-3648
- 1036480
- 1036480
- http://www.wireshark.org/security/wnpa-sec-2016-43.html
- http://www.wireshark.org/security/wnpa-sec-2016-43.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12624
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12624
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=b5a10743258bd016c07ebf6479137fda3d172a0f
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=b5a10743258bd016c07ebf6479137fda3d172a0f
Modified: 2024-11-21
CVE-2016-6508
epan/dissectors/packet-rlc.c in the RLC dissector in Wireshark 1.12.x before 1.12.13 and 2.x before 2.0.5 uses an incorrect integer data type, which allows remote attackers to cause a denial of service (large loop) via a crafted packet.
- [oss-security] 20160728 CVE request: Wireshark 2.0.5 and 1.12.13 security releases
- [oss-security] 20160728 CVE request: Wireshark 2.0.5 and 1.12.13 security releases
- DSA-3648
- DSA-3648
- 1036480
- 1036480
- http://www.wireshark.org/security/wnpa-sec-2016-44.html
- http://www.wireshark.org/security/wnpa-sec-2016-44.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12660
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12660
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=6cf9616df68a4db7e436bb77392586ff9ad84feb
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=6cf9616df68a4db7e436bb77392586ff9ad84feb
Modified: 2024-11-21
CVE-2016-6509
epan/dissectors/packet-ldss.c in the LDSS dissector in Wireshark 1.12.x before 1.12.13 and 2.x before 2.0.5 mishandles conversations, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
- [oss-security] 20160728 CVE request: Wireshark 2.0.5 and 1.12.13 security releases
- [oss-security] 20160728 CVE request: Wireshark 2.0.5 and 1.12.13 security releases
- DSA-3648
- DSA-3648
- 1036480
- 1036480
- http://www.wireshark.org/security/wnpa-sec-2016-45.html
- http://www.wireshark.org/security/wnpa-sec-2016-45.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12662
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12662
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=5a469ddc893f7c1912d0e15cc73bd3011e6cc2fb
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=5a469ddc893f7c1912d0e15cc73bd3011e6cc2fb
Modified: 2024-11-21
CVE-2016-6510
Off-by-one error in epan/dissectors/packet-rlc.c in the RLC dissector in Wireshark 1.12.x before 1.12.13 and 2.x before 2.0.5 allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) via a crafted packet.
- [oss-security] 20160728 CVE request: Wireshark 2.0.5 and 1.12.13 security releases
- [oss-security] 20160728 CVE request: Wireshark 2.0.5 and 1.12.13 security releases
- DSA-3648
- DSA-3648
- 1036480
- 1036480
- http://www.wireshark.org/security/wnpa-sec-2016-46.html
- http://www.wireshark.org/security/wnpa-sec-2016-46.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12664
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12664
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=47a5fa850b388fcf4ea762073806f01b459820fe
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=47a5fa850b388fcf4ea762073806f01b459820fe
Modified: 2024-11-21
CVE-2016-6511
epan/proto.c in Wireshark 1.12.x before 1.12.13 and 2.x before 2.0.5 allows remote attackers to cause a denial of service (OpenFlow dissector large loop) via a crafted packet.
- [oss-security] 20160728 CVE request: Wireshark 2.0.5 and 1.12.13 security releases
- [oss-security] 20160728 CVE request: Wireshark 2.0.5 and 1.12.13 security releases
- DSA-3648
- DSA-3648
- 1036480
- 1036480
- http://www.wireshark.org/security/wnpa-sec-2016-47.html
- http://www.wireshark.org/security/wnpa-sec-2016-47.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12659
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12659
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=56706427f53cc64793870bf072c2c06248ae88f3
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=56706427f53cc64793870bf072c2c06248ae88f3
Modified: 2024-11-21
CVE-2016-6512
epan/dissectors/packet-wap.c in Wireshark 2.x before 2.0.5 omits an overflow check in the tvb_get_guintvar function, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet, related to the MMSE, WAP, WBXML, and WSP dissectors.
- [oss-security] 20160728 CVE request: Wireshark 2.0.5 and 1.12.13 security releases
- [oss-security] 20160728 CVE request: Wireshark 2.0.5 and 1.12.13 security releases
- 92174
- 92174
- 1036480
- 1036480
- http://www.wireshark.org/security/wnpa-sec-2016-48.html
- http://www.wireshark.org/security/wnpa-sec-2016-48.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12661
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12661
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=2193bea3212d74e2a907152055e27d409b59485e
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=2193bea3212d74e2a907152055e27d409b59485e
- 40195
- 40195
Modified: 2024-11-21
CVE-2016-6513
epan/dissectors/packet-wbxml.c in the WBXML dissector in Wireshark 2.x before 2.0.5 does not restrict the recursion depth, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
- [oss-security] 20160728 CVE request: Wireshark 2.0.5 and 1.12.13 security releases
- [oss-security] 20160728 CVE request: Wireshark 2.0.5 and 1.12.13 security releases
- 1036480
- 1036480
- http://www.wireshark.org/security/wnpa-sec-2016-49.html
- http://www.wireshark.org/security/wnpa-sec-2016-49.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12663
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12663
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=347f071f1b9180563c28b0f3d0627b91eb456c72
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=347f071f1b9180563c28b0f3d0627b91eb456c72
Modified: 2024-11-21
CVE-2016-7175
epan/dissectors/packet-qnet6.c in the QNX6 QNET dissector in Wireshark 2.x before 2.0.6 mishandles MAC address data, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet.
- 1036760
- 1036760
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11850
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11850
- https://code.wireshark.org/review/16965
- https://code.wireshark.org/review/16965
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=1396f6ad555178f6b81cc1a65f9cb37b2d99aebf
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=1396f6ad555178f6b81cc1a65f9cb37b2d99aebf
- https://www.wireshark.org/security/wnpa-sec-2016-50.html
- https://www.wireshark.org/security/wnpa-sec-2016-50.html
Modified: 2024-11-21
CVE-2016-7176
epan/dissectors/packet-h225.c in the H.225 dissector in Wireshark 2.x before 2.0.6 calls snprintf with one of its input buffers as the output buffer, which allows remote attackers to cause a denial of service (copy overlap and application crash) via a crafted packet.
- DSA-3671
- DSA-3671
- 1036760
- 1036760
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12700
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12700
- https://code.wireshark.org/review/16852
- https://code.wireshark.org/review/16852
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=6d8261994bb928b7e80e3a2478a3d939ea1ef373
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=6d8261994bb928b7e80e3a2478a3d939ea1ef373
- https://www.wireshark.org/security/wnpa-sec-2016-51.html
- https://www.wireshark.org/security/wnpa-sec-2016-51.html
Modified: 2024-11-21
CVE-2016-7177
epan/dissectors/packet-catapult-dct2000.c in the Catapult DCT2000 dissector in Wireshark 2.x before 2.0.6 does not restrict the number of channels, which allows remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted packet.
- DSA-3671
- DSA-3671
- 1036760
- 1036760
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12750
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12750
- https://code.wireshark.org/review/17096
- https://code.wireshark.org/review/17096
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=2e37b271c473e1cbd01d62ebe1f3b011fc9fe638
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=2e37b271c473e1cbd01d62ebe1f3b011fc9fe638
- https://www.wireshark.org/security/wnpa-sec-2016-52.html
- https://www.wireshark.org/security/wnpa-sec-2016-52.html
Modified: 2024-11-21
CVE-2016-7178
epan/dissectors/packet-umts_fp.c in the UMTS FP dissector in Wireshark 2.x before 2.0.6 does not ensure that memory is allocated for certain data structures, which allows remote attackers to cause a denial of service (invalid write access and application crash) via a crafted packet.
- DSA-3671
- DSA-3671
- 1036760
- 1036760
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12751
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12751
- https://code.wireshark.org/review/17094
- https://code.wireshark.org/review/17094
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=315bba7c645b75af24215c6303d187b188610bba
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=315bba7c645b75af24215c6303d187b188610bba
- https://www.wireshark.org/security/wnpa-sec-2016-53.html
- https://www.wireshark.org/security/wnpa-sec-2016-53.html
Modified: 2024-11-21
CVE-2016-7179
Stack-based buffer overflow in epan/dissectors/packet-catapult-dct2000.c in the Catapult DCT2000 dissector in Wireshark 2.x before 2.0.6 allows remote attackers to cause a denial of service (application crash) via a crafted packet.
- DSA-3671
- DSA-3671
- 1036760
- 1036760
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12752
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12752
- https://code.wireshark.org/review/17095
- https://code.wireshark.org/review/17095
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=3b97fbddc23c065727b0147aab52a27c4aadffe7
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=3b97fbddc23c065727b0147aab52a27c4aadffe7
- https://www.wireshark.org/security/wnpa-sec-2016-54.html
- https://www.wireshark.org/security/wnpa-sec-2016-54.html
Modified: 2024-11-21
CVE-2016-7180
epan/dissectors/packet-ipmi-trace.c in the IPMI trace dissector in Wireshark 2.x before 2.0.6 does not properly consider whether a string is constant, which allows remote attackers to cause a denial of service (use-after-free and application crash) via a crafted packet.
- DSA-3671
- DSA-3671
- 1036760
- 1036760
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12782
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12782
- https://code.wireshark.org/review/17289
- https://code.wireshark.org/review/17289
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=5213496250aceff086404c568e3718ebc0060934
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=5213496250aceff086404c568e3718ebc0060934
- https://www.wireshark.org/security/wnpa-sec-2016-55.html
- https://www.wireshark.org/security/wnpa-sec-2016-55.html
Modified: 2024-11-21
CVE-2017-11409
In Wireshark 2.0.0 to 2.0.13, the GPRS LLC dissector could go into a large loop. This was addressed in epan/dissectors/packet-gprs-llc.c by using a different integer data type.
- 99914
- 99914
- 1038966
- 1038966
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13603
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13603
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=57b83bbbd76f543eb8d108919f13b662910bff9a
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=57b83bbbd76f543eb8d108919f13b662910bff9a
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- https://www.wireshark.org/security/wnpa-sec-2017-37.html
- https://www.wireshark.org/security/wnpa-sec-2017-37.html