Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2015-7830

Опубликовано: 15 нояб. 2015
Источник: debian
EPSS Низкий

Описание

The pcapng_read_if_descr_block function in wiretap/pcapng.c in the pcapng parser in Wireshark 1.12.x before 1.12.8 uses too many levels of pointer indirection, which allows remote attackers to cause a denial of service (incorrect free and application crash) via a crafted packet that triggers interface-filter copying.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
wiresharkfixed1.12.8+g5b6e543-1package
wiresharknot-affectedsqueezepackage

Примечания

  • https://www.wireshark.org/security/wnpa-sec-2015-30.html

EPSS

Процентиль: 68%
0.00574
Низкий

Связанные уязвимости

ubuntu
около 10 лет назад

The pcapng_read_if_descr_block function in wiretap/pcapng.c in the pcapng parser in Wireshark 1.12.x before 1.12.8 uses too many levels of pointer indirection, which allows remote attackers to cause a denial of service (incorrect free and application crash) via a crafted packet that triggers interface-filter copying.

redhat
больше 10 лет назад

The pcapng_read_if_descr_block function in wiretap/pcapng.c in the pcapng parser in Wireshark 1.12.x before 1.12.8 uses too many levels of pointer indirection, which allows remote attackers to cause a denial of service (incorrect free and application crash) via a crafted packet that triggers interface-filter copying.

nvd
около 10 лет назад

The pcapng_read_if_descr_block function in wiretap/pcapng.c in the pcapng parser in Wireshark 1.12.x before 1.12.8 uses too many levels of pointer indirection, which allows remote attackers to cause a denial of service (incorrect free and application crash) via a crafted packet that triggers interface-filter copying.

github
больше 3 лет назад

The pcapng_read_if_descr_block function in wiretap/pcapng.c in the pcapng parser in Wireshark 1.12.x before 1.12.8 uses too many levels of pointer indirection, which allows remote attackers to cause a denial of service (incorrect free and application crash) via a crafted packet that triggers interface-filter copying.

suse-cvrf
больше 10 лет назад

Security update for wireshark

EPSS

Процентиль: 68%
0.00574
Низкий