Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2015-8742

Опубликовано: 04 янв. 2016
Источник: debian

Описание

The dissect_CPMSetBindings function in epan/dissectors/packet-mswsp.c in the MS-WSP dissector in Wireshark 2.0.x before 2.0.1 does not validate the column size, which allows remote attackers to cause a denial of service (memory consumption or application crash) via a crafted packet.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
wiresharkfixed2.0.1+g59ea380-1package
wiresharknot-affectedjessiepackage
wiresharknot-affectedwheezypackage
wiresharknot-affectedsqueezepackage

Примечания

  • https://www.wireshark.org/security/wnpa-sec-2015-60.html

  • https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11931

  • https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=d48b0eff28c995947ac3f8d842ddd9b50dd5798d

Связанные уязвимости

CVSS3: 5.5
ubuntu
около 10 лет назад

The dissect_CPMSetBindings function in epan/dissectors/packet-mswsp.c in the MS-WSP dissector in Wireshark 2.0.x before 2.0.1 does not validate the column size, which allows remote attackers to cause a denial of service (memory consumption or application crash) via a crafted packet.

redhat
около 10 лет назад

The dissect_CPMSetBindings function in epan/dissectors/packet-mswsp.c in the MS-WSP dissector in Wireshark 2.0.x before 2.0.1 does not validate the column size, which allows remote attackers to cause a denial of service (memory consumption or application crash) via a crafted packet.

CVSS3: 5.5
nvd
около 10 лет назад

The dissect_CPMSetBindings function in epan/dissectors/packet-mswsp.c in the MS-WSP dissector in Wireshark 2.0.x before 2.0.1 does not validate the column size, which allows remote attackers to cause a denial of service (memory consumption or application crash) via a crafted packet.

CVSS3: 5.5
github
больше 3 лет назад

The dissect_CPMSetBindings function in epan/dissectors/packet-mswsp.c in the MS-WSP dissector in Wireshark 2.0.x before 2.0.1 does not validate the column size, which allows remote attackers to cause a denial of service (memory consumption or application crash) via a crafted packet.