ALT-PU-2017-1692-1
Closed vulnerabilities
Modified: 2024-11-21
CVE-2014-8710
The decompress_sigcomp_message function in epan/sigcomp-udvm.c in the SigComp UDVM dissector in Wireshark 1.10.x before 1.10.11 allows remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted packet.
- FEDORA-2014-15320
- FEDORA-2014-15320
- openSUSE-SU-2014:1503
- openSUSE-SU-2014:1503
- RHSA-2015:1460
- RHSA-2015:1460
- 60231
- 60231
- 60290
- 60290
- DSA-3076
- DSA-3076
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- 71069
- 71069
- http://www.wireshark.org/security/wnpa-sec-2014-20.html
- http://www.wireshark.org/security/wnpa-sec-2014-20.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10662
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10662
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=2bd15c7cefcf87aa6b2d9d53477f0ece897ba620
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=2bd15c7cefcf87aa6b2d9d53477f0ece897ba620
Modified: 2024-11-21
CVE-2014-8711
Multiple integer overflows in epan/dissectors/packet-amqp.c in the AMQP dissector in Wireshark 1.10.x before 1.10.11 and 1.12.x before 1.12.2 allow remote attackers to cause a denial of service (application crash) via a crafted amqp_0_10 PDU in a packet.
- FEDORA-2014-15320
- FEDORA-2014-15320
- openSUSE-SU-2014:1503
- openSUSE-SU-2014:1503
- RHSA-2015:1460
- RHSA-2015:1460
- 60231
- 60231
- 60290
- 60290
- DSA-3076
- DSA-3076
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- 71070
- 71070
- http://www.wireshark.org/security/wnpa-sec-2014-21.html
- http://www.wireshark.org/security/wnpa-sec-2014-21.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10582
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10582
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=8def8ef9c40189472a46d9b1ad95289780e09af5
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=8def8ef9c40189472a46d9b1ad95289780e09af5
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=8f62bb7cce5a82baa543b14800fd7c12548b497a
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=8f62bb7cce5a82baa543b14800fd7c12548b497a
Modified: 2024-11-21
CVE-2014-8712
The build_expert_data function in epan/dissectors/packet-ncp2222.inc in the NCP dissector in Wireshark 1.10.x before 1.10.11 and 1.12.x before 1.12.2 does not properly initialize a data structure, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
- FEDORA-2014-15320
- FEDORA-2014-15320
- openSUSE-SU-2014:1503
- openSUSE-SU-2014:1503
- RHSA-2015:1460
- RHSA-2015:1460
- 60231
- 60231
- 60290
- 60290
- DSA-3076
- DSA-3076
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- 71071
- 71071
- http://www.wireshark.org/security/wnpa-sec-2014-22.html
- http://www.wireshark.org/security/wnpa-sec-2014-22.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10628
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10628
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=41f6923b3049dfb57bef544a4c580f256f807e85
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=41f6923b3049dfb57bef544a4c580f256f807e85
Modified: 2024-11-21
CVE-2014-8713
Stack-based buffer overflow in the build_expert_data function in epan/dissectors/packet-ncp2222.inc in the NCP dissector in Wireshark 1.10.x before 1.10.11 and 1.12.x before 1.12.2 allows remote attackers to cause a denial of service (application crash) via a crafted packet.
- FEDORA-2014-15320
- FEDORA-2014-15320
- openSUSE-SU-2014:1503
- openSUSE-SU-2014:1503
- RHSA-2015:1460
- RHSA-2015:1460
- 60231
- 60231
- 60290
- 60290
- DSA-3076
- DSA-3076
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- 71073
- 71073
- http://www.wireshark.org/security/wnpa-sec-2014-22.html
- http://www.wireshark.org/security/wnpa-sec-2014-22.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10552
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10552
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=b9988e2bbfc7c6c41ef82c559bd11a8c19170491
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=b9988e2bbfc7c6c41ef82c559bd11a8c19170491
Modified: 2024-11-21
CVE-2014-8714
The dissect_write_structured_field function in epan/dissectors/packet-tn5250.c in the TN5250 dissector in Wireshark 1.10.x before 1.10.11 and 1.12.x before 1.12.2 allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
- FEDORA-2014-15320
- FEDORA-2014-15320
- openSUSE-SU-2014:1503
- openSUSE-SU-2014:1503
- RHSA-2015:1460
- RHSA-2015:1460
- 60231
- 60231
- 60290
- 60290
- DSA-3076
- DSA-3076
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- 71072
- 71072
- http://www.wireshark.org/security/wnpa-sec-2014-23.html
- http://www.wireshark.org/security/wnpa-sec-2014-23.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10596
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10596
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=1463db37d9bbc9cd532afdf2817caaf8eb367831
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=1463db37d9bbc9cd532afdf2817caaf8eb367831
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=bc2726578156f3608960fc65ce1f691639e6addc
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=bc2726578156f3608960fc65ce1f691639e6addc
Modified: 2024-11-21
CVE-2015-0559
Multiple use-after-free vulnerabilities in epan/dissectors/packet-wccp.c in the WCCP dissector in Wireshark 1.10.x before 1.10.12 and 1.12.x before 1.12.3 allow remote attackers to cause a denial of service (application crash) via a crafted packet, related to the use of packet-scope memory instead of pinfo-scope memory.
- openSUSE-SU-2015:0113
- openSUSE-SU-2015:0113
- 62612
- 62612
- http://www.wireshark.org/security/wnpa-sec-2015-01.html
- http://www.wireshark.org/security/wnpa-sec-2015-01.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10720
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10720
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=e843c6797db98bfceab382d5d7e76727e1014f5e
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=e843c6797db98bfceab382d5d7e76727e1014f5e
Modified: 2024-11-21
CVE-2015-0560
The dissect_wccp2r1_address_table_info function in epan/dissectors/packet-wccp.c in the WCCP dissector in Wireshark 1.10.x before 1.10.12 and 1.12.x before 1.12.3 does not initialize certain data structures, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
- openSUSE-SU-2015:0113
- openSUSE-SU-2015:0113
- 62612
- 62612
- http://www.wireshark.org/security/wnpa-sec-2015-01.html
- http://www.wireshark.org/security/wnpa-sec-2015-01.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10806
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10806
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=a442a1c0e815fd61416cf408bd74d85a042ccc6a
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=a442a1c0e815fd61416cf408bd74d85a042ccc6a
Modified: 2024-11-21
CVE-2015-0561
asn1/lpp/lpp.cnf in the LPP dissector in Wireshark 1.10.x before 1.10.12 and 1.12.x before 1.12.3 does not validate a certain index value, which allows remote attackers to cause a denial of service (out-of-bounds memory access and application crash) via a crafted packet.
- openSUSE-SU-2015:0113
- openSUSE-SU-2015:0113
- 62612
- 62612
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://www.wireshark.org/security/wnpa-sec-2015-02.html
- http://www.wireshark.org/security/wnpa-sec-2015-02.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10773
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10773
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=8e96830156bea314207b97315ccebd605317f142
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=8e96830156bea314207b97315ccebd605317f142
Modified: 2024-11-21
CVE-2015-0562
Multiple use-after-free vulnerabilities in epan/dissectors/packet-dec-dnart.c in the DEC DNA Routing Protocol dissector in Wireshark 1.10.x before 1.10.12 and 1.12.x before 1.12.3 allow remote attackers to cause a denial of service (application crash) via a crafted packet, related to the use of packet-scope memory instead of pinfo-scope memory.
- http://advisories.mageia.org/MGASA-2015-0019.html
- http://advisories.mageia.org/MGASA-2015-0019.html
- openSUSE-SU-2015:0113
- openSUSE-SU-2015:0113
- RHSA-2015:1460
- RHSA-2015:1460
- 62612
- 62612
- 62673
- 62673
- DSA-3141
- DSA-3141
- MDVSA-2015:022
- MDVSA-2015:022
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- 71921
- 71921
- http://www.wireshark.org/security/wnpa-sec-2015-03.html
- http://www.wireshark.org/security/wnpa-sec-2015-03.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10724
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10724
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=a559f2a050947f793c00159c0cd4d30f403f217c
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=a559f2a050947f793c00159c0cd4d30f403f217c
Modified: 2024-11-21
CVE-2015-0563
epan/dissectors/packet-smtp.c in the SMTP dissector in Wireshark 1.10.x before 1.10.12 and 1.12.x before 1.12.3 uses an incorrect length value for certain string-append operations, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
- http://advisories.mageia.org/MGASA-2015-0019.html
- http://advisories.mageia.org/MGASA-2015-0019.html
- openSUSE-SU-2015:0113
- openSUSE-SU-2015:0113
- 62612
- 62612
- MDVSA-2015:022
- MDVSA-2015:022
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- 71916
- 71916
- http://www.wireshark.org/security/wnpa-sec-2015-04.html
- http://www.wireshark.org/security/wnpa-sec-2015-04.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10823
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10823
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=611cfd00c283e7a77a2f1fd89c01b0b9f691411b
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=611cfd00c283e7a77a2f1fd89c01b0b9f691411b
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=854157883bd1972e012c65c0418a9732ef5d9fb0
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=854157883bd1972e012c65c0418a9732ef5d9fb0
Modified: 2024-11-21
CVE-2015-0564
Buffer underflow in the ssl_decrypt_record function in epan/dissectors/packet-ssl-utils.c in Wireshark 1.10.x before 1.10.12 and 1.12.x before 1.12.3 allows remote attackers to cause a denial of service (application crash) via a crafted packet that is improperly handled during decryption of an SSL session.
- http://advisories.mageia.org/MGASA-2015-0019.html
- http://advisories.mageia.org/MGASA-2015-0019.html
- openSUSE-SU-2015:0113
- openSUSE-SU-2015:0113
- RHSA-2015:1460
- RHSA-2015:1460
- 62612
- 62612
- 62673
- 62673
- DSA-3141
- DSA-3141
- MDVSA-2015:022
- MDVSA-2015:022
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- 71922
- 71922
- http://www.wireshark.org/security/wnpa-sec-2015-05.html
- http://www.wireshark.org/security/wnpa-sec-2015-05.html
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=d3581aecda62d2a51ea7088fd46975415b03ec57
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=d3581aecda62d2a51ea7088fd46975415b03ec57
Modified: 2024-11-21
CVE-2015-2187
The dissect_atn_cpdlc_heur function in asn1/atn-cpdlc/packet-atn-cpdlc-template.c in the ATN-CPDLC dissector in Wireshark 1.12.x before 1.12.4 does not properly follow the TRY/ENDTRY code requirements, which allows remote attackers to cause a denial of service (stack memory corruption and application crash) via a crafted packet.
- openSUSE-SU-2015:0489
- openSUSE-SU-2015:0489
- 72940
- 72940
- 1031858
- 1031858
- http://www.wireshark.org/security/wnpa-sec-2015-06.html
- http://www.wireshark.org/security/wnpa-sec-2015-06.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9952
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9952
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=1a3dd349233a4ee3e69295c8e79f9a216027037e
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=1a3dd349233a4ee3e69295c8e79f9a216027037e
- GLSA-201510-03
- GLSA-201510-03
Modified: 2024-11-21
CVE-2015-2188
epan/dissectors/packet-wcp.c in the WCP dissector in Wireshark 1.10.x before 1.10.13 and 1.12.x before 1.12.4 does not properly initialize a data structure, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet that is improperly handled during decompression.
- http://advisories.mageia.org/MGASA-2015-0117.html
- http://advisories.mageia.org/MGASA-2015-0117.html
- openSUSE-SU-2015:0489
- openSUSE-SU-2015:0489
- DSA-3210
- DSA-3210
- MDVSA-2015:183
- MDVSA-2015:183
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- 72942
- 72942
- 1031858
- 1031858
- http://www.wireshark.org/security/wnpa-sec-2015-07.html
- http://www.wireshark.org/security/wnpa-sec-2015-07.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10844
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10844
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=b204ff4846fe84b7789893c6b1d9afbdecac5b5d
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=b204ff4846fe84b7789893c6b1d9afbdecac5b5d
- GLSA-201510-03
- GLSA-201510-03
Modified: 2024-11-21
CVE-2015-2189
Off-by-one error in the pcapng_read function in wiretap/pcapng.c in the pcapng file parser in Wireshark 1.10.x before 1.10.13 and 1.12.x before 1.12.4 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via an invalid Interface Statistics Block (ISB) interface ID in a crafted packet.
- http://advisories.mageia.org/MGASA-2015-0117.html
- http://advisories.mageia.org/MGASA-2015-0117.html
- openSUSE-SU-2015:0489
- openSUSE-SU-2015:0489
- RHSA-2015:1460
- RHSA-2015:1460
- DSA-3210
- DSA-3210
- MDVSA-2015:183
- MDVSA-2015:183
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- 72944
- 72944
- 1031858
- 1031858
- http://www.wireshark.org/security/wnpa-sec-2015-08.html
- http://www.wireshark.org/security/wnpa-sec-2015-08.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10895
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10895
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=a835c85e3d662343d7283f1dcdacb8a11d1d0727
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=a835c85e3d662343d7283f1dcdacb8a11d1d0727
- GLSA-201510-03
- GLSA-201510-03
Modified: 2024-11-21
CVE-2015-2190
epan/proto.c in Wireshark 1.12.x before 1.12.4 does not properly handle integer data types greater than 32 bits in size, which allows remote attackers to cause a denial of service (assertion failure and application exit) via a crafted packet that is improperly handled by the LLDP dissector.
- openSUSE-SU-2015:0489
- openSUSE-SU-2015:0489
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- 72938
- 72938
- 1031858
- 1031858
- http://www.wireshark.org/security/wnpa-sec-2015-09.html
- http://www.wireshark.org/security/wnpa-sec-2015-09.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10983
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10983
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=d1865e000ebedf49fc0d9f221a11d6af74360837
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=d1865e000ebedf49fc0d9f221a11d6af74360837
- GLSA-201510-03
- GLSA-201510-03
Modified: 2024-11-21
CVE-2015-2191
Integer overflow in the dissect_tnef function in epan/dissectors/packet-tnef.c in the TNEF dissector in Wireshark 1.10.x before 1.10.13 and 1.12.x before 1.12.4 allows remote attackers to cause a denial of service (infinite loop) via a crafted length field in a packet.
- http://advisories.mageia.org/MGASA-2015-0117.html
- http://advisories.mageia.org/MGASA-2015-0117.html
- openSUSE-SU-2015:0489
- openSUSE-SU-2015:0489
- RHSA-2015:1460
- RHSA-2015:1460
- DSA-3210
- DSA-3210
- MDVSA-2015:183
- MDVSA-2015:183
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- 72941
- 72941
- 1031858
- 1031858
- http://www.wireshark.org/security/wnpa-sec-2015-10.html
- http://www.wireshark.org/security/wnpa-sec-2015-10.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11023
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11023
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=608cf324b3962877e9699f3e81e8f82ac9f1ea14
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=608cf324b3962877e9699f3e81e8f82ac9f1ea14
- GLSA-201510-03
- GLSA-201510-03
Modified: 2024-11-21
CVE-2015-2192
Integer overflow in the dissect_osd2_cdb_continuation function in epan/dissectors/packet-scsi-osd.c in the SCSI OSD dissector in Wireshark 1.12.x before 1.12.4 allows remote attackers to cause a denial of service (infinite loop) via a crafted length field in a packet.
- openSUSE-SU-2015:0489
- openSUSE-SU-2015:0489
- 72937
- 72937
- 1031858
- 1031858
- http://www.wireshark.org/security/wnpa-sec-2015-11.html
- http://www.wireshark.org/security/wnpa-sec-2015-11.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11024
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11024
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=c35ca6c051adb28c321db54cc138f18637977c9a
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=c35ca6c051adb28c321db54cc138f18637977c9a
- GLSA-201510-03
- GLSA-201510-03
Modified: 2024-11-21
CVE-2015-3808
The dissect_lbmr_pser function in epan/dissectors/packet-lbmr.c in the LBMR dissector in Wireshark 1.12.x before 1.12.5 does not reject a zero length, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
- 74628
- 74628
- http://www.wireshark.org/security/wnpa-sec-2015-12.html
- http://www.wireshark.org/security/wnpa-sec-2015-12.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11036
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11036
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=c19860dba8d158c42865c3d9051b6f318cb41169
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=c19860dba8d158c42865c3d9051b6f318cb41169
- GLSA-201510-03
- GLSA-201510-03
Modified: 2024-11-21
CVE-2015-3809
The dissect_lbmr_pser function in epan/dissectors/packet-lbmr.c in the LBMR dissector in Wireshark 1.12.x before 1.12.5 does not properly track the current offset, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
- DSA-3277
- DSA-3277
- 74632
- 74632
- http://www.wireshark.org/security/wnpa-sec-2015-12.html
- http://www.wireshark.org/security/wnpa-sec-2015-12.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11036
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11036
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=c19860dba8d158c42865c3d9051b6f318cb41169
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=c19860dba8d158c42865c3d9051b6f318cb41169
- GLSA-201510-03
- GLSA-201510-03
Modified: 2024-11-21
CVE-2015-3810
epan/dissectors/packet-websocket.c in the WebSocket dissector in Wireshark 1.12.x before 1.12.5 uses a recursive algorithm, which allows remote attackers to cause a denial of service (CPU consumption) via a crafted packet.
- DSA-3277
- DSA-3277
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- 74629
- 74629
- http://www.wireshark.org/security/wnpa-sec-2015-13.html
- http://www.wireshark.org/security/wnpa-sec-2015-13.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10989
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10989
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=4ee6bcbd2e03a25f1e6b0239558d9edeaf8040c0
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=4ee6bcbd2e03a25f1e6b0239558d9edeaf8040c0
- GLSA-201510-03
- GLSA-201510-03
Modified: 2024-11-21
CVE-2015-3811
epan/dissectors/packet-wcp.c in the WCP dissector in Wireshark 1.10.x before 1.10.14 and 1.12.x before 1.12.5 improperly refers to previously processed bytes, which allows remote attackers to cause a denial of service (application crash) via a crafted packet, a different vulnerability than CVE-2015-2188.
- RHSA-2017:0631
- RHSA-2017:0631
- DSA-3277
- DSA-3277
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.wireshark.org/security/wnpa-sec-2015-14.html
- http://www.wireshark.org/security/wnpa-sec-2015-14.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10978
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10978
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=a6fc6aa0b4efc1a1c3d7a2e3b5189e888fb6ccc2
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=a6fc6aa0b4efc1a1c3d7a2e3b5189e888fb6ccc2
- GLSA-201510-03
- GLSA-201510-03
Modified: 2024-11-21
CVE-2015-3812
Multiple memory leaks in the x11_init_protocol function in epan/dissectors/packet-x11.c in the X11 dissector in Wireshark 1.10.x before 1.10.14 and 1.12.x before 1.12.5 allow remote attackers to cause a denial of service (memory consumption) via a crafted packet.
- RHSA-2017:0631
- RHSA-2017:0631
- DSA-3277
- DSA-3277
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- 74637
- 74637
- http://www.wireshark.org/security/wnpa-sec-2015-15.html
- http://www.wireshark.org/security/wnpa-sec-2015-15.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11088
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11088
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=b8ccc2a6add29823a0ff0492fc50372449007e7b
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=b8ccc2a6add29823a0ff0492fc50372449007e7b
- GLSA-201510-03
- GLSA-201510-03
Modified: 2024-11-21
CVE-2015-3813
The fragment_add_work function in epan/reassemble.c in the packet-reassembly feature in Wireshark 1.12.x before 1.12.5 does not properly determine the defragmentation state in a case of an insufficient snapshot length, which allows remote attackers to cause a denial of service (memory consumption) via a crafted packet.
- RHSA-2017:0631
- RHSA-2017:0631
- DSA-3277
- DSA-3277
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- 74633
- 74633
- http://www.wireshark.org/security/wnpa-sec-2015-16.html
- http://www.wireshark.org/security/wnpa-sec-2015-16.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11129
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11129
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=c35f2ccb4433718416551cc7a85afb0860529d57
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=c35f2ccb4433718416551cc7a85afb0860529d57
- GLSA-201510-03
- GLSA-201510-03
Modified: 2024-11-21
CVE-2015-3814
The (1) dissect_tfs_request and (2) dissect_tfs_response functions in epan/dissectors/packet-ieee80211.c in the IEEE 802.11 dissector in Wireshark 1.10.x before 1.10.14 and 1.12.x before 1.12.5 interpret a zero value as a length rather than an error condition, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
- DSA-3277
- DSA-3277
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- 74631
- 74631
- http://www.wireshark.org/security/wnpa-sec-2015-17.html
- http://www.wireshark.org/security/wnpa-sec-2015-17.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11110
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11110
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=e243b0041328980a9bbd43bb8a8166d7422f9096
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=e243b0041328980a9bbd43bb8a8166d7422f9096
- GLSA-201510-03
- GLSA-201510-03
Modified: 2024-11-21
CVE-2015-3815
The detect_version function in wiretap/logcat.c in the Android Logcat file parser in Wireshark 1.12.x before 1.12.5 does not check the length of the payload, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a packet with a crafted payload, as demonstrated by a length of zero, a different vulnerability than CVE-2015-3906.
- DSA-3277
- DSA-3277
- 74630
- 74630
- http://www.wireshark.org/security/wnpa-sec-2015-18.html
- http://www.wireshark.org/security/wnpa-sec-2015-18.html
- https://blog.fuzzing-project.org/11-Read-heap-overflow-invalid-memory-access-in-Wireshark-TFPA-0072015.html
- https://blog.fuzzing-project.org/11-Read-heap-overflow-invalid-memory-access-in-Wireshark-TFPA-0072015.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11188
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11188
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=b3b1f7c3aa2233a147294bad833b748d38fba84d
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=b3b1f7c3aa2233a147294bad833b748d38fba84d
- GLSA-201510-03
- GLSA-201510-03
Modified: 2024-11-21
CVE-2015-3906
The logcat_dump_text function in wiretap/logcat.c in the Android Logcat file parser in Wireshark 1.12.x before 1.12.5 does not properly handle a lack of \0 termination, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted message in a packet, a different vulnerability than CVE-2015-3815.
- 74837
- 74837
- http://www.wireshark.org/security/wnpa-sec-2015-18.html
- http://www.wireshark.org/security/wnpa-sec-2015-18.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11188
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11188
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=b3b1f7c3aa2233a147294bad833b748d38fba84d
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=b3b1f7c3aa2233a147294bad833b748d38fba84d
- GLSA-201510-03
- GLSA-201510-03
Modified: 2024-11-21
CVE-2015-4651
The dissect_wccp2r1_address_table_info function in epan/dissectors/packet-wccp.c in the WCCP dissector in Wireshark 1.12.x before 1.12.6 does not properly determine whether enough memory is available for storing IP address strings, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
- openSUSE-SU-2015:1215
- openSUSE-SU-2015:1215
- DSA-3294
- DSA-3294
- http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
- http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
- 75317
- 75317
- 1032662
- 1032662
- http://www.wireshark.org/security/wnpa-sec-2015-19.html
- http://www.wireshark.org/security/wnpa-sec-2015-19.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11153
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11153
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=524ed1df6e6126cd63ba419ccb82c83636d77ee4
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=524ed1df6e6126cd63ba419ccb82c83636d77ee4
- GLSA-201510-03
- GLSA-201510-03
Modified: 2024-11-21
CVE-2015-4652
epan/dissectors/packet-gsm_a_dtap.c in the GSM DTAP dissector in Wireshark 1.12.x before 1.12.6 does not properly validate digit characters, which allows remote attackers to cause a denial of service (application crash) via a crafted packet, related to the de_emerg_num_list and de_bcd_num functions.
- openSUSE-SU-2015:1215
- openSUSE-SU-2015:1215
- DSA-3294
- DSA-3294
- 75316
- 75316
- 1032662
- 1032662
- http://www.wireshark.org/security/wnpa-sec-2015-20.html
- http://www.wireshark.org/security/wnpa-sec-2015-20.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11201
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11201
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=d93be95fc0e7011e8b4ade9171e7e66146063296
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=d93be95fc0e7011e8b4ade9171e7e66146063296
- GLSA-201510-03
- GLSA-201510-03
Modified: 2024-11-21
CVE-2015-6241
The proto_tree_add_bytes_item function in epan/proto.c in the protocol-tree implementation in Wireshark 1.12.x before 1.12.7 does not properly terminate a data structure after a failure to locate a number within a string, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
- FEDORA-2015-13945
- FEDORA-2015-13945
- FEDORA-2015-13946
- FEDORA-2015-13946
- openSUSE-SU-2015:1836
- openSUSE-SU-2015:1836
- DSA-3367
- DSA-3367
- http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
- http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
- 1033272
- 1033272
- http://www.wireshark.org/security/wnpa-sec-2015-21.html
- http://www.wireshark.org/security/wnpa-sec-2015-21.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11309
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11309
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=6126a6455058696dd0ac2073032bdfe066a6ae38
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=6126a6455058696dd0ac2073032bdfe066a6ae38
Modified: 2024-11-21
CVE-2015-6242
The wmem_block_split_free_chunk function in epan/wmem/wmem_allocator_block.c in the wmem block allocator in the memory manager in Wireshark 1.12.x before 1.12.7 does not properly consider a certain case of multiple realloc operations that restore a memory chunk to its original size, which allows remote attackers to cause a denial of service (incorrect free operation and application crash) via a crafted packet.
- FEDORA-2015-13945
- FEDORA-2015-13945
- FEDORA-2015-13946
- FEDORA-2015-13946
- openSUSE-SU-2015:1836
- openSUSE-SU-2015:1836
- DSA-3367
- DSA-3367
- http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
- http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
- 1033272
- 1033272
- http://www.wireshark.org/security/wnpa-sec-2015-22.html
- http://www.wireshark.org/security/wnpa-sec-2015-22.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11373
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11373
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=eaf1aad31e7c0a4908c20a42ae118c4dc8d474b6
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=eaf1aad31e7c0a4908c20a42ae118c4dc8d474b6
Modified: 2024-11-21
CVE-2015-6243
The dissector-table implementation in epan/packet.c in Wireshark 1.12.x before 1.12.7 mishandles table searches for empty strings, which allows remote attackers to cause a denial of service (application crash) via a crafted packet, related to the (1) dissector_get_string_handle and (2) dissector_get_default_string_handle functions.
- FEDORA-2015-13945
- FEDORA-2015-13945
- FEDORA-2015-13946
- FEDORA-2015-13946
- openSUSE-SU-2015:1836
- openSUSE-SU-2015:1836
- DSA-3367
- DSA-3367
- http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
- http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- 76384
- 76384
- 1033272
- 1033272
- http://www.wireshark.org/security/wnpa-sec-2015-23.html
- http://www.wireshark.org/security/wnpa-sec-2015-23.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11381
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11381
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=eb1ccbdccde89701f255f921d88992878057477d
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=eb1ccbdccde89701f255f921d88992878057477d
Modified: 2024-11-21
CVE-2015-6244
The dissect_zbee_secure function in epan/dissectors/packet-zbee-security.c in the ZigBee dissector in Wireshark 1.12.x before 1.12.7 improperly relies on length fields contained in packet data, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
- FEDORA-2015-13945
- FEDORA-2015-13945
- FEDORA-2015-13946
- FEDORA-2015-13946
- openSUSE-SU-2015:1836
- openSUSE-SU-2015:1836
- DSA-3367
- DSA-3367
- http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
- http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- 76383
- 76383
- 1033272
- 1033272
- http://www.wireshark.org/security/wnpa-sec-2015-24.html
- http://www.wireshark.org/security/wnpa-sec-2015-24.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11389
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11389
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=31571144be5f03f054a9c7e195b38c2f5792fe54
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=31571144be5f03f054a9c7e195b38c2f5792fe54
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=43c2e5769a17f0945fdcdabe35204a13ca9bbc85
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=43c2e5769a17f0945fdcdabe35204a13ca9bbc85
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=655b0dc623e29da212be3e205314624fe3182562
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=655b0dc623e29da212be3e205314624fe3182562
Modified: 2024-11-21
CVE-2015-6245
epan/dissectors/packet-gsm_rlcmac.c in the GSM RLC/MAC dissector in Wireshark 1.12.x before 1.12.7 uses incorrect integer data types, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
- FEDORA-2015-13945
- FEDORA-2015-13945
- FEDORA-2015-13946
- FEDORA-2015-13946
- openSUSE-SU-2015:1836
- openSUSE-SU-2015:1836
- DSA-3367
- DSA-3367
- http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
- http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- 76382
- 76382
- 1033272
- 1033272
- http://www.wireshark.org/security/wnpa-sec-2015-25.html
- http://www.wireshark.org/security/wnpa-sec-2015-25.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11358
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11358
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=78bc3dd93a562ca1b1c5dbc8f71d2967008be7ed
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=78bc3dd93a562ca1b1c5dbc8f71d2967008be7ed
Modified: 2024-11-21
CVE-2015-6246
The dissect_wa_payload function in epan/dissectors/packet-waveagent.c in the WaveAgent dissector in Wireshark 1.12.x before 1.12.7 mishandles large tag values, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
- FEDORA-2015-13945
- FEDORA-2015-13945
- FEDORA-2015-13946
- FEDORA-2015-13946
- openSUSE-SU-2015:1836
- openSUSE-SU-2015:1836
- DSA-3367
- DSA-3367
- http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
- http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- 76381
- 76381
- 1033272
- 1033272
- http://www.wireshark.org/security/wnpa-sec-2015-26.html
- http://www.wireshark.org/security/wnpa-sec-2015-26.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11358
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11358
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=5523726e6960fe9d7e301376fd7a94599f65fd42
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=5523726e6960fe9d7e301376fd7a94599f65fd42
Modified: 2024-11-21
CVE-2015-6247
The dissect_openflow_tablemod_v5 function in epan/dissectors/packet-openflow_v5.c in the OpenFlow dissector in Wireshark 1.12.x before 1.12.7 does not validate a certain offset value, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
- FEDORA-2015-13945
- FEDORA-2015-13945
- FEDORA-2015-13946
- FEDORA-2015-13946
- openSUSE-SU-2015:1836
- openSUSE-SU-2015:1836
- DSA-3367
- DSA-3367
- http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
- http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
- 1033272
- 1033272
- http://www.wireshark.org/security/wnpa-sec-2015-27.html
- http://www.wireshark.org/security/wnpa-sec-2015-27.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11358
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11358
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=828358d22c6bcf0a1ade5b3ffaa8018a385bfc6c
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=828358d22c6bcf0a1ade5b3ffaa8018a385bfc6c
Modified: 2024-11-21
CVE-2015-6248
The ptvcursor_add function in the ptvcursor implementation in epan/proto.c in Wireshark 1.12.x before 1.12.7 does not check whether the expected amount of data is available, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
- FEDORA-2015-13945
- FEDORA-2015-13945
- FEDORA-2015-13946
- FEDORA-2015-13946
- openSUSE-SU-2015:1836
- openSUSE-SU-2015:1836
- DSA-3367
- DSA-3367
- http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
- http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- 76387
- 76387
- 1033272
- 1033272
- http://www.wireshark.org/security/wnpa-sec-2015-28.html
- http://www.wireshark.org/security/wnpa-sec-2015-28.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11358
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11358
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=3fc4a831e035604b0af14ed8a5c9f6596a3448d0
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=3fc4a831e035604b0af14ed8a5c9f6596a3448d0
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=5b53445e815fd6b652d49df03ec3d60b088c4fbc
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=5b53445e815fd6b652d49df03ec3d60b088c4fbc
Modified: 2024-11-21
CVE-2015-6249
The dissect_wccp2r1_address_table_info function in epan/dissectors/packet-wccp.c in the WCCP dissector in Wireshark 1.12.x before 1.12.7 does not prevent the conflicting use of a table for both IPv4 and IPv6 addresses, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
- FEDORA-2015-13945
- FEDORA-2015-13945
- FEDORA-2015-13946
- FEDORA-2015-13946
- openSUSE-SU-2015:1836
- openSUSE-SU-2015:1836
- DSA-3367
- DSA-3367
- http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
- http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
- 1033272
- 1033272
- http://www.wireshark.org/security/wnpa-sec-2015-29.html
- http://www.wireshark.org/security/wnpa-sec-2015-29.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11358
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11358
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=b1eaf29d4056f05d1bd6a7f3d692553ec069a228
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=b1eaf29d4056f05d1bd6a7f3d692553ec069a228
Modified: 2024-11-21
CVE-2015-7830
The pcapng_read_if_descr_block function in wiretap/pcapng.c in the pcapng parser in Wireshark 1.12.x before 1.12.8 uses too many levels of pointer indirection, which allows remote attackers to cause a denial of service (incorrect free and application crash) via a crafted packet that triggers interface-filter copying.
- openSUSE-SU-2015:1836
- openSUSE-SU-2015:1836
- DSA-3505
- DSA-3505
- http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
- http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
- 77101
- 77101
- 78723
- 78723
- 1033953
- 1033953
- http://www.wireshark.org/security/wnpa-sec-2015-30.html
- http://www.wireshark.org/security/wnpa-sec-2015-30.html
- http://www.zerodayinitiative.com/advisories/ZDI-15-624
- http://www.zerodayinitiative.com/advisories/ZDI-15-624
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11455
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11455
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=72497918b16b706c3ba75e1f731f58b802ca14d1
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=72497918b16b706c3ba75e1f731f58b802ca14d1
Modified: 2024-11-21
CVE-2015-8711
epan/dissectors/packet-nbap.c in the NBAP dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate conversation data, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted packet.
- DSA-3505
- DSA-3505
- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- 79814
- 79814
- 1034551
- 1034551
- http://www.wireshark.org/security/wnpa-sec-2015-31.html
- http://www.wireshark.org/security/wnpa-sec-2015-31.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11602
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11602
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11835
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11835
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11841
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11841
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=23379ae3624df82c170f48e5bb3250a97ec61c13
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=23379ae3624df82c170f48e5bb3250a97ec61c13
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=5b4ada17723ed8af7e85cb48d537437ed614e417
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=5b4ada17723ed8af7e85cb48d537437ed614e417
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=5bf565690ad9f0771196d8fa237aa37fae3bb7cc
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=5bf565690ad9f0771196d8fa237aa37fae3bb7cc
- GLSA-201604-05
- GLSA-201604-05
Modified: 2024-11-21
CVE-2015-8712
The dissect_hsdsch_channel_info function in epan/dissectors/packet-umts_fp.c in the UMTS FP dissector in Wireshark 1.12.x before 1.12.9 does not validate the number of PDUs, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
- DSA-3505
- DSA-3505
- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- 79816
- 79816
- 1034551
- 1034551
- http://www.wireshark.org/security/wnpa-sec-2015-32.html
- http://www.wireshark.org/security/wnpa-sec-2015-32.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11602
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11602
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=2ae329a47b7f0ac94089c23e79c6b8bc18ba80ea
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=2ae329a47b7f0ac94089c23e79c6b8bc18ba80ea
- GLSA-201604-05
- GLSA-201604-05
Modified: 2024-11-21
CVE-2015-8713
epan/dissectors/packet-umts_fp.c in the UMTS FP dissector in Wireshark 1.12.x before 1.12.9 does not properly reserve memory for channel ID mappings, which allows remote attackers to cause a denial of service (out-of-bounds memory access and application crash) via a crafted packet.
- DSA-3505
- DSA-3505
- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- 79816
- 79816
- 1034551
- 1034551
- http://www.wireshark.org/security/wnpa-sec-2015-32.html
- http://www.wireshark.org/security/wnpa-sec-2015-32.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11606
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11606
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=67b6d4f7e6f2117b40957fd51518aa2a3e659002
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=67b6d4f7e6f2117b40957fd51518aa2a3e659002
- GLSA-201604-05
- GLSA-201604-05
Modified: 2024-11-21
CVE-2015-8714
The dissect_dcom_OBJREF function in epan/dissectors/packet-dcom.c in the DCOM dissector in Wireshark 1.12.x before 1.12.9 does not initialize a certain IPv4 data structure, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
- DSA-3505
- DSA-3505
- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- 79816
- 79816
- 1034551
- 1034551
- http://www.wireshark.org/security/wnpa-sec-2015-33.html
- http://www.wireshark.org/security/wnpa-sec-2015-33.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11610
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11610
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=d34267d0503a67235bf259fd2f2f2d2bb8b18cf5
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=d34267d0503a67235bf259fd2f2f2d2bb8b18cf5
- GLSA-201604-05
- GLSA-201604-05
Modified: 2024-11-21
CVE-2015-8715
epan/dissectors/packet-alljoyn.c in the AllJoyn dissector in Wireshark 1.12.x before 1.12.9 does not check for empty arguments, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
- DSA-3505
- DSA-3505
- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- 79816
- 79816
- 1034551
- 1034551
- http://www.wireshark.org/security/wnpa-sec-2015-34.html
- http://www.wireshark.org/security/wnpa-sec-2015-34.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11607
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11607
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=40caff2d1fb08262c84aaaa8ac584baa8866dd7c
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=40caff2d1fb08262c84aaaa8ac584baa8866dd7c
- GLSA-201604-05
- GLSA-201604-05
Modified: 2024-11-21
CVE-2015-8716
The init_t38_info_conv function in epan/dissectors/packet-t38.c in the T.38 dissector in Wireshark 1.12.x before 1.12.9 does not ensure that a conversation exists, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
- DSA-3505
- DSA-3505
- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- 79816
- 79816
- 1034551
- 1034551
- http://www.wireshark.org/security/wnpa-sec-2015-35.html
- http://www.wireshark.org/security/wnpa-sec-2015-35.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9887
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9887
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=eb6ccb1b0c4ad02b828652c3fe6e8d51c30a315e
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=eb6ccb1b0c4ad02b828652c3fe6e8d51c30a315e
- GLSA-201604-05
- GLSA-201604-05
Modified: 2024-11-21
CVE-2015-8717
The dissect_sdp function in epan/dissectors/packet-sdp.c in the SDP dissector in Wireshark 1.12.x before 1.12.9 does not prevent use of a negative media count, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
- DSA-3505
- DSA-3505
- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- 79816
- 79816
- 1034551
- 1034551
- http://www.wireshark.org/security/wnpa-sec-2015-36.html
- http://www.wireshark.org/security/wnpa-sec-2015-36.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9887
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9887
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=2ddd92b6f8f587325b9e14598658626f3a007c5c
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=2ddd92b6f8f587325b9e14598658626f3a007c5c
- GLSA-201604-05
- GLSA-201604-05
Modified: 2024-11-21
CVE-2015-8718
Double free vulnerability in epan/dissectors/packet-nlm.c in the NLM dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1, when the "Match MSG/RES packets for async NLM" option is enabled, allows remote attackers to cause a denial of service (application crash) via a crafted packet.
- DSA-3505
- DSA-3505
- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- 79814
- 79814
- 1034551
- 1034551
- http://www.wireshark.org/security/wnpa-sec-2015-37.html
- http://www.wireshark.org/security/wnpa-sec-2015-37.html
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=81dfe6d450ada42d12f20ac26a6d8ae2302df37e
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=81dfe6d450ada42d12f20ac26a6d8ae2302df37e
- GLSA-201604-05
- GLSA-201604-05
Modified: 2024-11-21
CVE-2015-8719
The dissect_dns_answer function in epan/dissectors/packet-dns.c in the DNS dissector in Wireshark 1.12.x before 1.12.9 mishandles the EDNS0 Client Subnet option, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
- DSA-3505
- DSA-3505
- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- 79816
- 79816
- 1034551
- 1034551
- http://www.wireshark.org/security/wnpa-sec-2015-38.html
- http://www.wireshark.org/security/wnpa-sec-2015-38.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10988
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10988
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=30651ab18b42e666f57ea239e58f3ff3a5e9c4ad
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=30651ab18b42e666f57ea239e58f3ff3a5e9c4ad
- GLSA-201604-05
- GLSA-201604-05
Modified: 2024-11-21
CVE-2015-8720
The dissect_ber_GeneralizedTime function in epan/dissectors/packet-ber.c in the BER dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 improperly checks an sscanf return value, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
- DSA-3505
- DSA-3505
- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- 79814
- 79814
- 1034551
- 1034551
- http://www.wireshark.org/security/wnpa-sec-2015-39.html
- http://www.wireshark.org/security/wnpa-sec-2015-39.html
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=921bb07115fbffc081ec56a5022b4a9d58db6d39
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=921bb07115fbffc081ec56a5022b4a9d58db6d39
- GLSA-201604-05
- GLSA-201604-05
Modified: 2024-11-21
CVE-2015-8721
Buffer overflow in the tvb_uncompress function in epan/tvbuff_zlib.c in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 allows remote attackers to cause a denial of service (application crash) via a crafted packet with zlib compression.
- DSA-3505
- DSA-3505
- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- 79814
- 79814
- 1034551
- 1034551
- http://www.wireshark.org/security/wnpa-sec-2015-40.html
- http://www.wireshark.org/security/wnpa-sec-2015-40.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11548
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11548
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=cec0593ae6c3bca65eff65741c2a10f3de3e0afe
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=cec0593ae6c3bca65eff65741c2a10f3de3e0afe
- GLSA-201604-05
- GLSA-201604-05
Modified: 2024-11-21
CVE-2015-8722
epan/dissectors/packet-sctp.c in the SCTP dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the frame pointer, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted packet.
- DSA-3505
- DSA-3505
- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- 79814
- 79814
- 1034551
- 1034551
- http://www.wireshark.org/security/wnpa-sec-2015-41.html
- http://www.wireshark.org/security/wnpa-sec-2015-41.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11767
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11767
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=1b32d505a59475d51d9b2bed5f0869d2d154e8b6
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=1b32d505a59475d51d9b2bed5f0869d2d154e8b6
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=2259bf8a827088081bef101f98e4983de8aa8099
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=2259bf8a827088081bef101f98e4983de8aa8099
- GLSA-201604-05
- GLSA-201604-05
Modified: 2024-11-21
CVE-2015-8723
The AirPDcapPacketProcess function in epan/crypt/airpdcap.c in the 802.11 dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the relationship between the total length and the capture length, which allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) via a crafted packet.
- DSA-3505
- DSA-3505
- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- 79382
- 79382
- 1034551
- 1034551
- http://www.wireshark.org/security/wnpa-sec-2015-42.html
- http://www.wireshark.org/security/wnpa-sec-2015-42.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11790
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11790
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=40b283181c63cb28bc6f58d80315eccca6650da0
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=40b283181c63cb28bc6f58d80315eccca6650da0
- GLSA-201604-05
- GLSA-201604-05
Modified: 2024-11-21
CVE-2015-8724
The AirPDcapDecryptWPABroadcastKey function in epan/crypt/airpdcap.c in the 802.11 dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not verify the WPA broadcast key length, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet.
- DSA-3505
- DSA-3505
- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- 79382
- 79382
- 1034551
- 1034551
- http://www.wireshark.org/security/wnpa-sec-2015-42.html
- http://www.wireshark.org/security/wnpa-sec-2015-42.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11826
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11826
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=83f2818118ae255db949bb3a4b3a26ebd1c5f7c5
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=83f2818118ae255db949bb3a4b3a26ebd1c5f7c5
- GLSA-201604-05
- GLSA-201604-05
Modified: 2024-11-21
CVE-2015-8725
The dissect_diameter_base_framed_ipv6_prefix function in epan/dissectors/packet-diameter.c in the DIAMETER dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the IPv6 prefix length, which allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) via a crafted packet.
- DSA-3505
- DSA-3505
- 79382
- 79382
- 1034551
- 1034551
- http://www.wireshark.org/security/wnpa-sec-2015-43.html
- http://www.wireshark.org/security/wnpa-sec-2015-43.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11792
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11792
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=aaa28a9d39158ca1033bbd3372cf423abbf4f202
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=aaa28a9d39158ca1033bbd3372cf423abbf4f202
- GLSA-201604-05
- GLSA-201604-05
Modified: 2024-11-21
CVE-2015-8726
wiretap/vwr.c in the VeriWave file parser in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate certain signature and Modulation and Coding Scheme (MCS) data, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted file.
- DSA-3505
- DSA-3505
- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- 79382
- 79382
- 1034551
- 1034551
- http://www.wireshark.org/security/wnpa-sec-2015-44.html
- http://www.wireshark.org/security/wnpa-sec-2015-44.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11789
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11789
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11791
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11791
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=185911de7d337246044c8e99da2f5b4bac74c0d5
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=185911de7d337246044c8e99da2f5b4bac74c0d5
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=b8fa3d463c1bdd9b84c897441e7a5c8ad1f0f292
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=b8fa3d463c1bdd9b84c897441e7a5c8ad1f0f292
- GLSA-201604-05
- GLSA-201604-05
Modified: 2024-11-21
CVE-2015-8727
The dissect_rsvp_common function in epan/dissectors/packet-rsvp.c in the RSVP dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not properly maintain request-key data, which allows remote attackers to cause a denial of service (use-after-free and application crash) via a crafted packet.
- DSA-3505
- DSA-3505
- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- 79382
- 79382
- 1034551
- 1034551
- http://www.wireshark.org/security/wnpa-sec-2015-45.html
- http://www.wireshark.org/security/wnpa-sec-2015-45.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11793
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11793
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=56baca60271379cb97f6a4a6bf72eb526e8b52d0
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=56baca60271379cb97f6a4a6bf72eb526e8b52d0
- GLSA-201604-05
- GLSA-201604-05
Modified: 2024-11-21
CVE-2015-8728
The Mobile Identity parser in (1) epan/dissectors/packet-ansi_a.c in the ANSI A dissector and (2) epan/dissectors/packet-gsm_a_common.c in the GSM A dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 improperly uses the tvb_bcd_dig_to_wmem_packet_str function, which allows remote attackers to cause a denial of service (buffer overflow and application crash) via a crafted packet.
- DSA-3505
- DSA-3505
- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- 79382
- 79382
- 1034551
- 1034551
- http://www.wireshark.org/security/wnpa-sec-2015-46.html
- http://www.wireshark.org/security/wnpa-sec-2015-46.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11797
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11797
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=15edc8d714b11dcff3a04e5d00b8db9adfdb81ed
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=15edc8d714b11dcff3a04e5d00b8db9adfdb81ed
- GLSA-201604-05
- GLSA-201604-05
Modified: 2024-11-21
CVE-2015-8729
The ascend_seek function in wiretap/ascendtext.c in the Ascend file parser in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not ensure the presence of a '\0' character at the end of a date string, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted file.
- DSA-3505
- DSA-3505
- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- 79382
- 79382
- 1034551
- 1034551
- http://www.wireshark.org/security/wnpa-sec-2015-47.html
- http://www.wireshark.org/security/wnpa-sec-2015-47.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11794
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11794
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=338da1c0ea0b2f8595d3a7b6d6c9548f7da3e27b
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=338da1c0ea0b2f8595d3a7b6d6c9548f7da3e27b
- GLSA-201604-05
- GLSA-201604-05
Modified: 2024-11-21
CVE-2015-8730
epan/dissectors/packet-nbap.c in the NBAP dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the number of items, which allows remote attackers to cause a denial of service (invalid read operation and application crash) via a crafted packet.
- DSA-3505
- DSA-3505
- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- 79382
- 79382
- 1034551
- 1034551
- http://www.wireshark.org/security/wnpa-sec-2015-48.html
- http://www.wireshark.org/security/wnpa-sec-2015-48.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11815
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11815
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=d2644aef369af0667220b5bd69996915b29d753d
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=d2644aef369af0667220b5bd69996915b29d753d
- GLSA-201604-05
- GLSA-201604-05
Modified: 2024-11-21
CVE-2015-8731
The dissct_rsl_ipaccess_msg function in epan/dissectors/packet-rsl.c in the RSL dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not reject unknown TLV types, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet.
- DSA-3516
- DSA-3516
- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- 79382
- 79382
- 1034551
- 1034551
- http://www.wireshark.org/security/wnpa-sec-2015-49.html
- http://www.wireshark.org/security/wnpa-sec-2015-49.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11829
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11829
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=2930d3105c3ff2bfb1278b34ad10e2e71c3b8fb0
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=2930d3105c3ff2bfb1278b34ad10e2e71c3b8fb0
- GLSA-201604-05
- GLSA-201604-05
Modified: 2024-11-21
CVE-2015-8732
The dissect_zcl_pwr_prof_pwrprofstatersp function in epan/dissectors/packet-zbee-zcl-general.c in the ZigBee ZCL dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the Total Profile Number field, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet.
- DSA-3505
- DSA-3505
- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- 79382
- 79382
- 1034551
- 1034551
- http://www.wireshark.org/security/wnpa-sec-2015-50.html
- http://www.wireshark.org/security/wnpa-sec-2015-50.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11830
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11830
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=9352616ec9742f2ed3d2802d0c8c100d51ca410b
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=9352616ec9742f2ed3d2802d0c8c100d51ca410b
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=eb0c034f6e4cdbf5ae36dd9ba8e2743630b7bd38
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=eb0c034f6e4cdbf5ae36dd9ba8e2743630b7bd38
- GLSA-201604-05
- GLSA-201604-05
Modified: 2024-11-21
CVE-2015-8733
The ngsniffer_process_record function in wiretap/ngsniffer.c in the Sniffer file parser in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the relationships between record lengths and record header lengths, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted file.
- DSA-3505
- DSA-3505
- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- 79814
- 79814
- 1034551
- 1034551
- http://www.wireshark.org/security/wnpa-sec-2015-51.html
- http://www.wireshark.org/security/wnpa-sec-2015-51.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11827
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11827
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=53a3e53fce30523d11ab3df319fba7b75d63076f
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=53a3e53fce30523d11ab3df319fba7b75d63076f
- GLSA-201604-05
- GLSA-201604-05
Modified: 2024-11-21
CVE-2016-2521
Untrusted search path vulnerability in the WiresharkApplication class in ui/qt/wireshark_application.cpp in Wireshark 1.12.x before 1.12.10 and 2.0.x before 2.0.2 on Windows allows local users to gain privileges via a Trojan horse riched20.dll.dll file in the current working directory, related to use of QLibrary.
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- 1035118
- 1035118
- http://www.wireshark.org/security/wnpa-sec-2016-01.html
- http://www.wireshark.org/security/wnpa-sec-2016-01.html
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=4a79cf2e1ab056faaddd252aa56520435b318a56
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=4a79cf2e1ab056faaddd252aa56520435b318a56
- GLSA-201604-05
- GLSA-201604-05
Modified: 2024-11-21
CVE-2016-2523
The dnp3_al_process_object function in epan/dissectors/packet-dnp.c in the DNP3 dissector in Wireshark 1.12.x before 1.12.10 and 2.0.x before 2.0.2 allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
- openSUSE-SU-2016:0660
- openSUSE-SU-2016:0660
- openSUSE-SU-2016:0661
- openSUSE-SU-2016:0661
- DSA-3516
- DSA-3516
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 1035118
- 1035118
- http://www.wireshark.org/security/wnpa-sec-2016-03.html
- http://www.wireshark.org/security/wnpa-sec-2016-03.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11938
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11938
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=260afe11feb796d1fde992d8f8c133ebd950b573
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=260afe11feb796d1fde992d8f8c133ebd950b573
- GLSA-201604-05
- GLSA-201604-05
Modified: 2024-11-21
CVE-2016-2530
The dissct_rsl_ipaccess_msg function in epan/dissectors/packet-rsl.c in the RSL dissector in Wireshark 1.12.x before 1.12.10 and 2.0.x before 2.0.2 mishandles the case of an unrecognized TLV type, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet, a different vulnerability than CVE-2016-2531.
- openSUSE-SU-2016:0660
- openSUSE-SU-2016:0660
- openSUSE-SU-2016:0661
- openSUSE-SU-2016:0661
- DSA-3516
- DSA-3516
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- 1035118
- 1035118
- http://www.wireshark.org/security/wnpa-sec-2016-10.html
- http://www.wireshark.org/security/wnpa-sec-2016-10.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11829
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11829
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=2930d3105c3ff2bfb1278b34ad10e2e71c3b8fb0
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=2930d3105c3ff2bfb1278b34ad10e2e71c3b8fb0
- GLSA-201604-05
- GLSA-201604-05
Modified: 2024-11-21
CVE-2016-2531
Off-by-one error in epan/dissectors/packet-rsl.c in the RSL dissector in Wireshark 1.12.x before 1.12.10 and 2.0.x before 2.0.2 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet that triggers a 0xff tag value, a different vulnerability than CVE-2016-2530.
- openSUSE-SU-2016:0660
- openSUSE-SU-2016:0660
- openSUSE-SU-2016:0661
- openSUSE-SU-2016:0661
- DSA-3516
- DSA-3516
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- 1035118
- 1035118
- http://www.wireshark.org/security/wnpa-sec-2016-10.html
- http://www.wireshark.org/security/wnpa-sec-2016-10.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11829
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11829
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=de65fd6b00d0b891930324b9549c93ccfe9cac30
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=de65fd6b00d0b891930324b9549c93ccfe9cac30
- GLSA-201604-05
- GLSA-201604-05
Modified: 2024-11-21
CVE-2016-2532
The dissect_llrp_parameters function in epan/dissectors/packet-llrp.c in the LLRP dissector in Wireshark 1.12.x before 1.12.10 and 2.0.x before 2.0.2 does not limit the recursion depth, which allows remote attackers to cause a denial of service (memory consumption or application crash) via a crafted packet.
- openSUSE-SU-2016:0660
- openSUSE-SU-2016:0660
- openSUSE-SU-2016:0661
- openSUSE-SU-2016:0661
- DSA-3516
- DSA-3516
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- 1035118
- 1035118
- http://www.wireshark.org/security/wnpa-sec-2016-11.html
- http://www.wireshark.org/security/wnpa-sec-2016-11.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12048
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12048
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=4a2cd6c79ecbf2cb21f985f01ce1c1e3030285ec
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=4a2cd6c79ecbf2cb21f985f01ce1c1e3030285ec
- GLSA-201604-05
- GLSA-201604-05
Modified: 2024-11-21
CVE-2016-4006
epan/proto.c in Wireshark 1.12.x before 1.12.11 and 2.0.x before 2.0.3 does not limit the protocol-tree depth, which allows remote attackers to cause a denial of service (stack memory consumption and application crash) via a crafted packet.
- DSA-3585
- DSA-3585
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- 1035685
- 1035685
- http://www.wireshark.org/security/wnpa-sec-2016-25.html
- http://www.wireshark.org/security/wnpa-sec-2016-25.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12268
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12268
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=8dc9551e1d56290e6f7f02cc38b77e1d211fd4a5
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=8dc9551e1d56290e6f7f02cc38b77e1d211fd4a5
Modified: 2024-11-21
CVE-2016-4078
The IEEE 802.11 dissector in Wireshark 1.12.x before 1.12.11 and 2.0.x before 2.0.3 does not properly restrict element lists, which allows remote attackers to cause a denial of service (deep recursion and application crash) via a crafted packet, related to epan/dissectors/packet-capwap.c and epan/dissectors/packet-ieee80211.c.
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- 1035685
- 1035685
- http://www.wireshark.org/security/wnpa-sec-2016-21.html
- http://www.wireshark.org/security/wnpa-sec-2016-21.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11824
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11824
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12187
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12187
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=e2745d741ec11f395d41c0aafa24df9dec136399
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=e2745d741ec11f395d41c0aafa24df9dec136399
Modified: 2024-11-21
CVE-2016-4079
epan/dissectors/packet-pktc.c in the PKTC dissector in Wireshark 1.12.x before 1.12.11 and 2.0.x before 2.0.3 does not verify BER identifiers, which allows remote attackers to cause a denial of service (out-of-bounds write and application crash) via a crafted packet.
- DSA-3585
- DSA-3585
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- 1035685
- 1035685
- http://www.wireshark.org/security/wnpa-sec-2016-22.html
- http://www.wireshark.org/security/wnpa-sec-2016-22.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12206
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12206
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=4cdc9eeba58f866bd5f273e9c5b3876857a7a4bf
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=4cdc9eeba58f866bd5f273e9c5b3876857a7a4bf
Modified: 2024-11-21
CVE-2016-4080
epan/dissectors/packet-pktc.c in the PKTC dissector in Wireshark 1.12.x before 1.12.11 and 2.0.x before 2.0.3 misparses timestamp fields, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet.
- DSA-3585
- DSA-3585
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- 1035685
- 1035685
- http://www.wireshark.org/security/wnpa-sec-2016-23.html
- http://www.wireshark.org/security/wnpa-sec-2016-23.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12242
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12242
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=ad097385c05c370440fb810e67f811398efc0ea0
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=ad097385c05c370440fb810e67f811398efc0ea0
Modified: 2024-11-21
CVE-2016-4081
epan/dissectors/packet-iax2.c in the IAX2 dissector in Wireshark 1.12.x before 1.12.11 and 2.0.x before 2.0.3 uses an incorrect integer data type, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
- DSA-3585
- DSA-3585
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- 1035685
- 1035685
- http://www.wireshark.org/security/wnpa-sec-2016-24.html
- http://www.wireshark.org/security/wnpa-sec-2016-24.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12260
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12260
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=42f299be6abb302f32cec78b1c0812364c9f9285
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=42f299be6abb302f32cec78b1c0812364c9f9285
Modified: 2024-11-21
CVE-2016-4082
epan/dissectors/packet-gsm_cbch.c in the GSM CBCH dissector in Wireshark 1.12.x before 1.12.11 and 2.0.x before 2.0.3 uses the wrong variable to index an array, which allows remote attackers to cause a denial of service (out-of-bounds access and application crash) via a crafted packet.
- DSA-3585
- DSA-3585
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- 1035685
- 1035685
- http://www.wireshark.org/security/wnpa-sec-2016-26.html
- http://www.wireshark.org/security/wnpa-sec-2016-26.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12278
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12278
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=0fe522dfc689c3ebd119f2a6775d1f275c5f04d8
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=0fe522dfc689c3ebd119f2a6775d1f275c5f04d8
Modified: 2024-11-21
CVE-2016-4085
Stack-based buffer overflow in epan/dissectors/packet-ncp2222.inc in the NCP dissector in Wireshark 1.12.x before 1.12.11 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a long string in a packet.
- DSA-3585
- DSA-3585
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- 87467
- 87467
- 1035685
- 1035685
- http://www.wireshark.org/security/wnpa-sec-2016-28.html
- http://www.wireshark.org/security/wnpa-sec-2016-28.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12293
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12293
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=99efcb0f5aeeb4b2179e88c7a4233022aaeecf0b
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=99efcb0f5aeeb4b2179e88c7a4233022aaeecf0b
Modified: 2024-11-21
CVE-2016-4417
Off-by-one error in epan/dissectors/packet-gsm_abis_oml.c in the GSM A-bis OML dissector in Wireshark 1.12.x before 1.12.10 and 2.x before 2.0.2 allows remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted packet that triggers a 0xff tag value.
- openSUSE-SU-2016:0660
- openSUSE-SU-2016:0660
- openSUSE-SU-2016:0661
- openSUSE-SU-2016:0661
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11825
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11825
- https://www.wireshark.org/security/wnpa-sec-2016-14.html
- https://www.wireshark.org/security/wnpa-sec-2016-14.html
Modified: 2024-11-21
CVE-2016-4418
epan/dissectors/packet-ber.c in the ASN.1 BER dissector in Wireshark 1.12.x before 1.12.10 and 2.x before 2.0.2 allows remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted packet that triggers an empty set.
- openSUSE-SU-2016:0660
- openSUSE-SU-2016:0660
- openSUSE-SU-2016:0661
- openSUSE-SU-2016:0661
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12106
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12106
- https://www.wireshark.org/security/wnpa-sec-2016-15.html
- https://www.wireshark.org/security/wnpa-sec-2016-15.html
Modified: 2024-11-21
CVE-2016-4421
epan/dissectors/packet-ber.c in the ASN.1 BER dissector in Wireshark 1.12.x before 1.12.10 and 2.x before 2.0.2 allows remote attackers to cause a denial of service (deep recursion, stack consumption, and application crash) via a packet that specifies deeply nested data.
- openSUSE-SU-2016:0660
- openSUSE-SU-2016:0660
- openSUSE-SU-2016:0661
- openSUSE-SU-2016:0661
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11822
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11822
- https://www.wireshark.org/security/wnpa-sec-2016-18.html
- https://www.wireshark.org/security/wnpa-sec-2016-18.html
Modified: 2024-11-21
CVE-2016-5350
epan/dissectors/packet-dcerpc-spoolss.c in the SPOOLS component in Wireshark 1.12.x before 1.12.12 and 2.x before 2.0.4 mishandles unexpected offsets, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
- DSA-3615
- DSA-3615
- [oss-security] 20160609 Re: CVE Request: wireshark releases
- [oss-security] 20160609 Re: CVE Request: wireshark releases
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- 91140
- 91140
- https://github.com/wireshark/wireshark/commit/b4d16b4495b732888e12baf5b8a7e9bf2665e22b
- https://github.com/wireshark/wireshark/commit/b4d16b4495b732888e12baf5b8a7e9bf2665e22b
- https://www.wireshark.org/security/wnpa-sec-2016-29.html
- https://www.wireshark.org/security/wnpa-sec-2016-29.html
Modified: 2024-11-21
CVE-2016-5351
epan/crypt/airpdcap.c in the IEEE 802.11 dissector in Wireshark 1.12.x before 1.12.12 and 2.x before 2.0.4 mishandles the lack of an EAPOL_RSN_KEY, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
- DSA-3615
- DSA-3615
- [oss-security] 20160609 Re: CVE Request: wireshark releases
- [oss-security] 20160609 Re: CVE Request: wireshark releases
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- 91140
- 91140
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11585
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11585
- https://github.com/wireshark/wireshark/commit/9b0b20b8d5f8c9f7839d58ff6c5900f7e19283b4
- https://github.com/wireshark/wireshark/commit/9b0b20b8d5f8c9f7839d58ff6c5900f7e19283b4
- https://www.wireshark.org/security/wnpa-sec-2016-30.html
- https://www.wireshark.org/security/wnpa-sec-2016-30.html
Modified: 2024-11-21
CVE-2016-5353
epan/dissectors/packet-umts_fp.c in the UMTS FP dissector in Wireshark 1.12.x before 1.12.12 and 2.x before 2.0.4 mishandles the reserved C/T value, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
- DSA-3615
- DSA-3615
- [oss-security] 20160609 Re: CVE Request: wireshark releases
- [oss-security] 20160609 Re: CVE Request: wireshark releases
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- 91140
- 91140
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12191
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12191
- https://github.com/wireshark/wireshark/commit/7d7190695ce2ff269fdffb04e87139995cde21f4
- https://github.com/wireshark/wireshark/commit/7d7190695ce2ff269fdffb04e87139995cde21f4
- https://www.wireshark.org/security/wnpa-sec-2016-32.html
- https://www.wireshark.org/security/wnpa-sec-2016-32.html
Modified: 2024-11-21
CVE-2016-5354
The USB subsystem in Wireshark 1.12.x before 1.12.12 and 2.x before 2.0.4 mishandles class types, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
- DSA-3615
- DSA-3615
- [oss-security] 20160609 Re: CVE Request: wireshark releases
- [oss-security] 20160609 Re: CVE Request: wireshark releases
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- 91140
- 91140
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12356
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12356
- https://github.com/wireshark/wireshark/commit/2cb5985bf47bdc8bea78d28483ed224abdd33dc6
- https://github.com/wireshark/wireshark/commit/2cb5985bf47bdc8bea78d28483ed224abdd33dc6
- https://www.wireshark.org/security/wnpa-sec-2016-33.html
- https://www.wireshark.org/security/wnpa-sec-2016-33.html
Modified: 2024-11-21
CVE-2016-5355
wiretap/toshiba.c in the Toshiba file parser in Wireshark 1.12.x before 1.12.12 and 2.x before 2.0.4 mishandles sscanf unsigned-integer processing, which allows remote attackers to cause a denial of service (application crash) via a crafted file.
- DSA-3615
- DSA-3615
- [oss-security] 20160609 Re: CVE Request: wireshark releases
- [oss-security] 20160609 Re: CVE Request: wireshark releases
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- 91140
- 91140
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12394
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12394
- https://github.com/wireshark/wireshark/commit/3270dfac43da861c714df76513456b46765ff47f
- https://github.com/wireshark/wireshark/commit/3270dfac43da861c714df76513456b46765ff47f
- https://github.com/wireshark/wireshark/commit/5efb45231671baa2db2011d8f67f9d6e72bc455b
- https://github.com/wireshark/wireshark/commit/5efb45231671baa2db2011d8f67f9d6e72bc455b
- https://www.wireshark.org/security/wnpa-sec-2016-34.html
- https://www.wireshark.org/security/wnpa-sec-2016-34.html
Modified: 2024-11-21
CVE-2016-5356
wiretap/cosine.c in the CoSine file parser in Wireshark 1.12.x before 1.12.12 and 2.x before 2.0.4 mishandles sscanf unsigned-integer processing, which allows remote attackers to cause a denial of service (application crash) via a crafted file.
- DSA-3615
- DSA-3615
- [oss-security] 20160609 Re: CVE Request: wireshark releases
- [oss-security] 20160609 Re: CVE Request: wireshark releases
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- 91140
- 91140
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12395
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12395
- https://github.com/wireshark/wireshark/commit/a66628e425db725df1ac52a3c573a03357060ddd
- https://github.com/wireshark/wireshark/commit/a66628e425db725df1ac52a3c573a03357060ddd
- https://github.com/wireshark/wireshark/commit/f5ec0afb766f19519ea9623152cca3bbe2229500
- https://github.com/wireshark/wireshark/commit/f5ec0afb766f19519ea9623152cca3bbe2229500
- https://www.wireshark.org/security/wnpa-sec-2016-35.html
- https://www.wireshark.org/security/wnpa-sec-2016-35.html
Modified: 2024-11-21
CVE-2016-5357
wiretap/netscreen.c in the NetScreen file parser in Wireshark 1.12.x before 1.12.12 and 2.x before 2.0.4 mishandles sscanf unsigned-integer processing, which allows remote attackers to cause a denial of service (application crash) via a crafted file.
- DSA-3615
- DSA-3615
- [oss-security] 20160609 Re: CVE Request: wireshark releases
- [oss-security] 20160609 Re: CVE Request: wireshark releases
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- 91140
- 91140
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12396
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12396
- https://github.com/wireshark/wireshark/commit/11edc83b98a61e890d7bb01855389d40e984ea82
- https://github.com/wireshark/wireshark/commit/11edc83b98a61e890d7bb01855389d40e984ea82
- https://github.com/wireshark/wireshark/commit/6a140eca7b78b230f1f90a739a32257476513c78
- https://github.com/wireshark/wireshark/commit/6a140eca7b78b230f1f90a739a32257476513c78
- https://www.wireshark.org/security/wnpa-sec-2016-36.html
- https://www.wireshark.org/security/wnpa-sec-2016-36.html
Modified: 2024-11-21
CVE-2016-5359
epan/dissectors/packet-wbxml.c in the WBXML dissector in Wireshark 1.12.x before 1.12.12 mishandles offsets, which allows remote attackers to cause a denial of service (integer overflow and infinite loop) via a crafted packet.
- DSA-3615
- DSA-3615
- [oss-security] 20160609 Re: CVE Request: wireshark releases
- [oss-security] 20160609 Re: CVE Request: wireshark releases
- 91140
- 91140
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12408
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12408
- https://github.com/wireshark/wireshark/commit/b8e0d416898bb975a02c1b55883342edc5b4c9c0
- https://github.com/wireshark/wireshark/commit/b8e0d416898bb975a02c1b55883342edc5b4c9c0
- https://www.wireshark.org/security/wnpa-sec-2016-38.html
- https://www.wireshark.org/security/wnpa-sec-2016-38.html
Modified: 2024-11-21
CVE-2016-6504
epan/dissectors/packet-ncp2222.inc in the NDS dissector in Wireshark 1.12.x before 1.12.13 does not properly maintain a ptvc data structure, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted packet.
- [oss-security] 20160728 CVE request: Wireshark 2.0.5 and 1.12.13 security releases
- [oss-security] 20160728 CVE request: Wireshark 2.0.5 and 1.12.13 security releases
- DSA-3648
- DSA-3648
- 92164
- 92164
- 1036480
- 1036480
- http://www.wireshark.org/security/wnpa-sec-2016-40.html
- http://www.wireshark.org/security/wnpa-sec-2016-40.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12576
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12576
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=9eacbb4d48df647648127b9258f9e5aeeb0c7d99
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=9eacbb4d48df647648127b9258f9e5aeeb0c7d99
- 40194
- 40194
Modified: 2024-11-21
CVE-2016-6505
epan/dissectors/packet-packetbb.c in the PacketBB dissector in Wireshark 1.12.x before 1.12.13 and 2.x before 2.0.5 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted packet.
- [oss-security] 20160728 CVE request: Wireshark 2.0.5 and 1.12.13 security releases
- [oss-security] 20160728 CVE request: Wireshark 2.0.5 and 1.12.13 security releases
- DSA-3648
- DSA-3648
- 92163
- 92163
- 1036480
- 1036480
- http://www.wireshark.org/security/wnpa-sec-2016-41.html
- http://www.wireshark.org/security/wnpa-sec-2016-41.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12577
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12577
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=94e97e45cf614c7bb8fe90c23df52910246b2c95
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=94e97e45cf614c7bb8fe90c23df52910246b2c95
- 40197
- 40197
Modified: 2024-11-21
CVE-2016-6506
epan/dissectors/packet-wsp.c in the WSP dissector in Wireshark 1.12.x before 1.12.13 and 2.x before 2.0.5 allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
- [oss-security] 20160728 CVE request: Wireshark 2.0.5 and 1.12.13 security releases
- [oss-security] 20160728 CVE request: Wireshark 2.0.5 and 1.12.13 security releases
- DSA-3648
- DSA-3648
- 1036480
- 1036480
- http://www.wireshark.org/security/wnpa-sec-2016-42.html
- http://www.wireshark.org/security/wnpa-sec-2016-42.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12594
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12594
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=a9d5256890c9189c7461bfce6ed6edce5d861499
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=a9d5256890c9189c7461bfce6ed6edce5d861499
Modified: 2024-11-21
CVE-2016-6507
epan/dissectors/packet-mmse.c in the MMSE dissector in Wireshark 1.12.x before 1.12.13 allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
- [oss-security] 20160728 CVE request: Wireshark 2.0.5 and 1.12.13 security releases
- [oss-security] 20160728 CVE request: Wireshark 2.0.5 and 1.12.13 security releases
- DSA-3648
- DSA-3648
- 1036480
- 1036480
- http://www.wireshark.org/security/wnpa-sec-2016-43.html
- http://www.wireshark.org/security/wnpa-sec-2016-43.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12624
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12624
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=b5a10743258bd016c07ebf6479137fda3d172a0f
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=b5a10743258bd016c07ebf6479137fda3d172a0f
Modified: 2024-11-21
CVE-2016-6508
epan/dissectors/packet-rlc.c in the RLC dissector in Wireshark 1.12.x before 1.12.13 and 2.x before 2.0.5 uses an incorrect integer data type, which allows remote attackers to cause a denial of service (large loop) via a crafted packet.
- [oss-security] 20160728 CVE request: Wireshark 2.0.5 and 1.12.13 security releases
- [oss-security] 20160728 CVE request: Wireshark 2.0.5 and 1.12.13 security releases
- DSA-3648
- DSA-3648
- 1036480
- 1036480
- http://www.wireshark.org/security/wnpa-sec-2016-44.html
- http://www.wireshark.org/security/wnpa-sec-2016-44.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12660
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12660
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=6cf9616df68a4db7e436bb77392586ff9ad84feb
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=6cf9616df68a4db7e436bb77392586ff9ad84feb
Modified: 2024-11-21
CVE-2016-6509
epan/dissectors/packet-ldss.c in the LDSS dissector in Wireshark 1.12.x before 1.12.13 and 2.x before 2.0.5 mishandles conversations, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
- [oss-security] 20160728 CVE request: Wireshark 2.0.5 and 1.12.13 security releases
- [oss-security] 20160728 CVE request: Wireshark 2.0.5 and 1.12.13 security releases
- DSA-3648
- DSA-3648
- 1036480
- 1036480
- http://www.wireshark.org/security/wnpa-sec-2016-45.html
- http://www.wireshark.org/security/wnpa-sec-2016-45.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12662
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12662
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=5a469ddc893f7c1912d0e15cc73bd3011e6cc2fb
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=5a469ddc893f7c1912d0e15cc73bd3011e6cc2fb
Modified: 2024-11-21
CVE-2016-6510
Off-by-one error in epan/dissectors/packet-rlc.c in the RLC dissector in Wireshark 1.12.x before 1.12.13 and 2.x before 2.0.5 allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) via a crafted packet.
- [oss-security] 20160728 CVE request: Wireshark 2.0.5 and 1.12.13 security releases
- [oss-security] 20160728 CVE request: Wireshark 2.0.5 and 1.12.13 security releases
- DSA-3648
- DSA-3648
- 1036480
- 1036480
- http://www.wireshark.org/security/wnpa-sec-2016-46.html
- http://www.wireshark.org/security/wnpa-sec-2016-46.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12664
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12664
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=47a5fa850b388fcf4ea762073806f01b459820fe
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=47a5fa850b388fcf4ea762073806f01b459820fe
Modified: 2024-11-21
CVE-2016-6511
epan/proto.c in Wireshark 1.12.x before 1.12.13 and 2.x before 2.0.5 allows remote attackers to cause a denial of service (OpenFlow dissector large loop) via a crafted packet.
- [oss-security] 20160728 CVE request: Wireshark 2.0.5 and 1.12.13 security releases
- [oss-security] 20160728 CVE request: Wireshark 2.0.5 and 1.12.13 security releases
- DSA-3648
- DSA-3648
- 1036480
- 1036480
- http://www.wireshark.org/security/wnpa-sec-2016-47.html
- http://www.wireshark.org/security/wnpa-sec-2016-47.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12659
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12659
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=56706427f53cc64793870bf072c2c06248ae88f3
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=56706427f53cc64793870bf072c2c06248ae88f3
Modified: 2024-11-21
CVE-2016-9372
In Wireshark 2.2.0 to 2.2.1, the Profinet I/O dissector could loop excessively, triggered by network traffic or a capture file. This was addressed in plugins/profinet/packet-pn-rtc-one.c by rejecting input with too many I/O objects.
- 94368
- 94368
- 1037313
- 1037313
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12851
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12851
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=4127e3930ef663114567002001f44e01eba8a250
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=4127e3930ef663114567002001f44e01eba8a250
- https://www.wireshark.org/security/wnpa-sec-2016-58.html
- https://www.wireshark.org/security/wnpa-sec-2016-58.html
Modified: 2024-11-21
CVE-2016-9373
In Wireshark 2.2.0 to 2.2.1 and 2.0.0 to 2.0.7, the DCERPC dissector could crash with a use-after-free, triggered by network traffic or a capture file. This was addressed in epan/dissectors/packet-dcerpc-nt.c and epan/dissectors/packet-dcerpc-spoolss.c by using the wmem file scope for private strings.
- DSA-3719
- DSA-3719
- 94369
- 94369
- 1037313
- 1037313
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13072
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13072
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=cc8e37f0f53c4401bb1644a34eddea345940a8df
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=cc8e37f0f53c4401bb1644a34eddea345940a8df
- https://www.wireshark.org/security/wnpa-sec-2016-61.html
- https://www.wireshark.org/security/wnpa-sec-2016-61.html
Modified: 2024-11-21
CVE-2016-9374
In Wireshark 2.2.0 to 2.2.1 and 2.0.0 to 2.0.7, the AllJoyn dissector could crash with a buffer over-read, triggered by network traffic or a capture file. This was addressed in epan/dissectors/packet-alljoyn.c by ensuring that a length variable properly tracked the state of a signature variable.
- DSA-3719
- DSA-3719
- 94369
- 94369
- 1037313
- 1037313
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12953
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12953
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=a5770b6559b6e6765c4ef800e85ae42781ea4900
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=a5770b6559b6e6765c4ef800e85ae42781ea4900
- https://www.wireshark.org/security/wnpa-sec-2016-59.html
- https://www.wireshark.org/security/wnpa-sec-2016-59.html
Modified: 2024-11-21
CVE-2016-9375
In Wireshark 2.2.0 to 2.2.1 and 2.0.0 to 2.0.7, the DTN dissector could go into an infinite loop, triggered by network traffic or a capture file. This was addressed in epan/dissectors/packet-dtn.c by checking whether SDNV evaluation was successful.
- DSA-3719
- DSA-3719
- 94369
- 94369
- 1037313
- 1037313
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13097
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13097
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=be6a10afc59f8182b9884d02f9857d547539fe8a
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=be6a10afc59f8182b9884d02f9857d547539fe8a
- https://www.wireshark.org/security/wnpa-sec-2016-62.html
- https://www.wireshark.org/security/wnpa-sec-2016-62.html
Modified: 2024-11-21
CVE-2016-9376
In Wireshark 2.2.0 to 2.2.1 and 2.0.0 to 2.0.7, the OpenFlow dissector could crash with memory exhaustion, triggered by network traffic or a capture file. This was addressed in epan/dissectors/packet-openflow_v5.c by ensuring that certain length values were sufficiently large.
- DSA-3719
- DSA-3719
- 94369
- 94369
- 1037313
- 1037313
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13071
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13071
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=f2a7af8d3928e18ef15778e63b9b6c78f8bd1bef
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=f2a7af8d3928e18ef15778e63b9b6c78f8bd1bef
- https://www.wireshark.org/security/wnpa-sec-2016-60.html
- https://www.wireshark.org/security/wnpa-sec-2016-60.html
Modified: 2024-11-21
CVE-2017-6014
In Wireshark 2.2.4 and earlier, a crafted or malformed STANAG 4607 capture file will cause an infinite loop and memory exhaustion. If the packet size field in a packet header is null, the offset to read from will not advance, causing continuous attempts to read the same zero length packet. This will quickly exhaust all system memory.
Modified: 2024-11-21
CVE-2017-7700
In Wireshark 2.2.0 to 2.2.5 and 2.0.0 to 2.0.11, the NetScaler file parser could go into an infinite loop, triggered by a malformed capture file. This was addressed in wiretap/netscaler.c by ensuring a nonzero record size.
- 97631
- 97631
- 1038262
- 1038262
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13478
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13478
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=8fc0af859de4993951a915ad735be350221f3f53
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=8fc0af859de4993951a915ad735be350221f3f53
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- GLSA-201706-12
- GLSA-201706-12
- https://www.wireshark.org/security/wnpa-sec-2017-14.html
- https://www.wireshark.org/security/wnpa-sec-2017-14.html
Modified: 2024-11-21
CVE-2017-7701
In Wireshark 2.2.0 to 2.2.5 and 2.0.0 to 2.0.11, the BGP dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-bgp.c by using a different integer data type.
- 97632
- 97632
- 1038262
- 1038262
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13557
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13557
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=fa31f69b407436d0946f84baa0acdcc50962bf7a
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=fa31f69b407436d0946f84baa0acdcc50962bf7a
- GLSA-201706-12
- GLSA-201706-12
- https://www.wireshark.org/security/wnpa-sec-2017-16.html
- https://www.wireshark.org/security/wnpa-sec-2017-16.html
Modified: 2024-11-21
CVE-2017-7702
In Wireshark 2.2.0 to 2.2.5 and 2.0.0 to 2.0.11, the WBXML dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-wbxml.c by adding length validation.
- 97633
- 97633
- 1038262
- 1038262
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13477
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13477
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=2f322f66cbcca2fefdaa630494f9d6c97eb659b7
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=2f322f66cbcca2fefdaa630494f9d6c97eb659b7
- GLSA-201706-12
- GLSA-201706-12
- https://www.wireshark.org/security/wnpa-sec-2017-13.html
- https://www.wireshark.org/security/wnpa-sec-2017-13.html
Modified: 2024-11-21
CVE-2017-7703
In Wireshark 2.2.0 to 2.2.5 and 2.0.0 to 2.0.11, the IMAP dissector could crash, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-imap.c by calculating a line's end correctly.
- 97636
- 97636
- 1038262
- 1038262
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13466
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13466
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=671e32820ab29d41d712cc8a472eab9b672684d9
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=671e32820ab29d41d712cc8a472eab9b672684d9
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- GLSA-201706-12
- GLSA-201706-12
- https://www.wireshark.org/security/wnpa-sec-2017-12.html
- https://www.wireshark.org/security/wnpa-sec-2017-12.html
Modified: 2024-11-21
CVE-2017-7704
In Wireshark 2.2.0 to 2.2.5, the DOF dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-dof.c by using a different integer data type and adjusting a return value.
- 97634
- 97634
- 1038262
- 1038262
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13453
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13453
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=6032b0fe5fc1176ab77e03e20765f95fbd21b19e
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=6032b0fe5fc1176ab77e03e20765f95fbd21b19e
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=da53a90b6895e47e03c5de05edf84bd99d535fd8
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=da53a90b6895e47e03c5de05edf84bd99d535fd8
- GLSA-201706-12
- GLSA-201706-12
- https://www.wireshark.org/security/wnpa-sec-2017-17.html
- https://www.wireshark.org/security/wnpa-sec-2017-17.html
Modified: 2024-11-21
CVE-2017-7705
In Wireshark 2.2.0 to 2.2.5 and 2.0.0 to 2.0.11, the RPC over RDMA dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-rpcrdma.c by correctly checking for going beyond the maximum offset.
- 97630
- 97630
- 1038262
- 1038262
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13558
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13558
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=08d392bbecc8fb666bf979e70a34536007b83ea2
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=08d392bbecc8fb666bf979e70a34536007b83ea2
- GLSA-201706-12
- GLSA-201706-12
- https://www.wireshark.org/security/wnpa-sec-2017-15.html
- https://www.wireshark.org/security/wnpa-sec-2017-15.html
Modified: 2024-11-21
CVE-2017-9343
In Wireshark 2.2.0 to 2.2.6 and 2.0.0 to 2.0.12, the MSNIP dissector misuses a NULL pointer. This was addressed in epan/dissectors/packet-msnip.c by validating an IPv4 address.
- 98797
- 98797
- 1038612
- 1038612
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1678
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1678
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13725
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13725
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=27556320b41904716b9c9f73ef8f4fe705d1e669
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=27556320b41904716b9c9f73ef8f4fe705d1e669
- https://www.wireshark.org/security/wnpa-sec-2017-30.html
- https://www.wireshark.org/security/wnpa-sec-2017-30.html
Modified: 2024-11-21
CVE-2017-9344
In Wireshark 2.2.0 to 2.2.6 and 2.0.0 to 2.0.12, the Bluetooth L2CAP dissector could divide by zero. This was addressed in epan/dissectors/packet-btl2cap.c by validating an interval value.
- 98796
- 98796
- 1038612
- 1038612
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1539
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1539
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13701
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13701
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=6308ae03d82a29a2e3d75e1c325c8a9f6c44dcdf
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=6308ae03d82a29a2e3d75e1c325c8a9f6c44dcdf
- [debian-lts-announce] 20190325 [SECURITY] [DLA 1729-1] wireshark security update
- [debian-lts-announce] 20190325 [SECURITY] [DLA 1729-1] wireshark security update
- https://www.wireshark.org/security/wnpa-sec-2017-29.html
- https://www.wireshark.org/security/wnpa-sec-2017-29.html
Modified: 2024-11-21
CVE-2017-9345
In Wireshark 2.2.0 to 2.2.6 and 2.0.0 to 2.0.12, the DNS dissector could go into an infinite loop. This was addressed in epan/dissectors/packet-dns.c by trying to detect self-referencing pointers.
- 98798
- 98798
- 1038612
- 1038612
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1206
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1206
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13633
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13633
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=e280c9b637327a65d132bfe72d917b87e6844eb5
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=e280c9b637327a65d132bfe72d917b87e6844eb5
- https://www.wireshark.org/security/wnpa-sec-2017-26.html
- https://www.wireshark.org/security/wnpa-sec-2017-26.html
Modified: 2024-11-21
CVE-2017-9346
In Wireshark 2.2.0 to 2.2.6 and 2.0.0 to 2.0.12, the SoulSeek dissector could go into an infinite loop. This was addressed in epan/dissectors/packet-slsk.c by making loop bounds more explicit.
- 98799
- 98799
- 1038612
- 1038612
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1200
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1200
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13631
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13631
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=6c0bd15bd46a95c5b7dce02fe23c594429bb6c7e
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=6c0bd15bd46a95c5b7dce02fe23c594429bb6c7e
- https://www.wireshark.org/security/wnpa-sec-2017-25.html
- https://www.wireshark.org/security/wnpa-sec-2017-25.html
Modified: 2024-11-21
CVE-2017-9347
In Wireshark 2.2.0 to 2.2.6, the ROS dissector could crash with a NULL pointer dereference. This was addressed in epan/dissectors/asn1/ros/packet-ros-template.c by validating an OID.
- 98800
- 98800
- 1038612
- 1038612
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1216
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1216
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13637
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13637
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=278e52f26e7e1a23f8d2e8ed98693328c992bdce
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=278e52f26e7e1a23f8d2e8ed98693328c992bdce
- 42124
- 42124
- https://www.wireshark.org/security/wnpa-sec-2017-31.html
- https://www.wireshark.org/security/wnpa-sec-2017-31.html
Modified: 2024-11-21
CVE-2017-9348
In Wireshark 2.2.0 to 2.2.6, the DOF dissector could read past the end of a buffer. This was addressed in epan/dissectors/packet-dof.c by validating a size value.
- 98801
- 98801
- 1038612
- 1038612
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1151
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1151
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13608
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13608
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=7fe55f96672b7bf2b4ceb9ae039a0f43eddd3151
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=7fe55f96672b7bf2b4ceb9ae039a0f43eddd3151
- https://www.wireshark.org/security/wnpa-sec-2017-23.html
- https://www.wireshark.org/security/wnpa-sec-2017-23.html
Modified: 2024-11-21
CVE-2017-9349
In Wireshark 2.2.0 to 2.2.6 and 2.0.0 to 2.0.12, the DICOM dissector has an infinite loop. This was addressed in epan/dissectors/packet-dcm.c by validating a length value.
- 98803
- 98803
- 1038612
- 1038612
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1329
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1329
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13685
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13685
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=cb1b6494c44c9e939d9e2554de6b812de395e3f9
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=cb1b6494c44c9e939d9e2554de6b812de395e3f9
- [debian-lts-announce] 20190325 [SECURITY] [DLA 1729-1] wireshark security update
- [debian-lts-announce] 20190325 [SECURITY] [DLA 1729-1] wireshark security update
- https://www.wireshark.org/security/wnpa-sec-2017-27.html
- https://www.wireshark.org/security/wnpa-sec-2017-27.html
Modified: 2024-11-21
CVE-2017-9350
In Wireshark 2.2.0 to 2.2.6 and 2.0.0 to 2.0.12, the openSAFETY dissector could crash or exhaust system memory. This was addressed in epan/dissectors/packet-opensafety.c by checking for a negative length.
- 98806
- 98806
- 1038612
- 1038612
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1212
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1212
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13649
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13649
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=dbc7cb0bbdd501fa96e0cb98668f6d6bf17ac4e6
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=dbc7cb0bbdd501fa96e0cb98668f6d6bf17ac4e6
- https://www.wireshark.org/security/wnpa-sec-2017-28.html
- https://www.wireshark.org/security/wnpa-sec-2017-28.html
Modified: 2024-11-21
CVE-2017-9351
In Wireshark 2.2.0 to 2.2.6 and 2.0.0 to 2.0.12, the DHCP dissector could read past the end of a buffer. This was addressed in epan/dissectors/packet-bootp.c by extracting the Vendor Class Identifier more carefully.
- 98808
- 98808
- 1038612
- 1038612
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1153
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1153
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1183
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1183
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13609
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13609
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13628
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13628
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=a6e033c14da13bd5f72dfe07a347586517639d12
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=a6e033c14da13bd5f72dfe07a347586517639d12
- https://www.wireshark.org/security/wnpa-sec-2017-24.html
- https://www.wireshark.org/security/wnpa-sec-2017-24.html
Modified: 2024-11-21
CVE-2017-9352
In Wireshark 2.2.0 to 2.2.6 and 2.0.0 to 2.0.12, the Bazaar dissector could go into an infinite loop. This was addressed in epan/dissectors/packet-bzr.c by ensuring that backwards parsing cannot occur.
- 98804
- 98804
- 1038612
- 1038612
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13599
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13599
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=8c5e0cee278ff0678b0ebf4b9c2a614974b4029a
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=8c5e0cee278ff0678b0ebf4b9c2a614974b4029a
- https://www.wireshark.org/security/wnpa-sec-2017-22.html
- https://www.wireshark.org/security/wnpa-sec-2017-22.html
Modified: 2024-11-21
CVE-2017-9353
In Wireshark 2.2.0 to 2.2.6, the IPv6 dissector could crash. This was addressed in epan/dissectors/packet-ipv6.c by validating an IPv6 address.
- 98805
- 98805
- 1038612
- 1038612
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1303
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1303
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13675
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13675
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=40b2d475c2ad550c1a0f536d5eb30f2a7404c4f0
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=40b2d475c2ad550c1a0f536d5eb30f2a7404c4f0
- 42123
- 42123
- https://www.wireshark.org/security/wnpa-sec-2017-33.html
- https://www.wireshark.org/security/wnpa-sec-2017-33.html
Modified: 2024-11-21
CVE-2017-9354
In Wireshark 2.2.0 to 2.2.6 and 2.0.0 to 2.0.12, the RGMP dissector could crash. This was addressed in epan/dissectors/packet-rgmp.c by validating an IPv4 address.
- 98802
- 98802
- 1038612
- 1038612
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1243
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1243
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13646
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13646
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=3a77395e651acd81eb41ffd8fbdbf711e1133d76
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=3a77395e651acd81eb41ffd8fbdbf711e1133d76
- https://www.wireshark.org/security/wnpa-sec-2017-32.html
- https://www.wireshark.org/security/wnpa-sec-2017-32.html