Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-2522

Опубликовано: 28 фев. 2016
Источник: debian
EPSS Низкий

Описание

The dissect_ber_constrained_bitstring function in epan/dissectors/packet-ber.c in the ASN.1 BER dissector in Wireshark 2.0.x before 2.0.2 does not verify that a certain length is nonzero, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
wiresharkfixed2.0.2+ga16e22e-1package
wiresharknot-affectedjessiepackage
wiresharknot-affectedwheezypackage
wiresharknot-affectedsqueezepackage

Примечания

  • https://www.wireshark.org/security/wnpa-sec-2016-02.html

  • Affected versions: 2.0.0 to 2.0.1

  • Fixed versions: 2.0.2

EPSS

Процентиль: 44%
0.00216
Низкий

Связанные уязвимости

CVSS3: 5.9
ubuntu
больше 9 лет назад

The dissect_ber_constrained_bitstring function in epan/dissectors/packet-ber.c in the ASN.1 BER dissector in Wireshark 2.0.x before 2.0.2 does not verify that a certain length is nonzero, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet.

redhat
больше 9 лет назад

The dissect_ber_constrained_bitstring function in epan/dissectors/packet-ber.c in the ASN.1 BER dissector in Wireshark 2.0.x before 2.0.2 does not verify that a certain length is nonzero, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet.

CVSS3: 5.9
nvd
больше 9 лет назад

The dissect_ber_constrained_bitstring function in epan/dissectors/packet-ber.c in the ASN.1 BER dissector in Wireshark 2.0.x before 2.0.2 does not verify that a certain length is nonzero, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet.

CVSS3: 5.9
github
больше 3 лет назад

The dissect_ber_constrained_bitstring function in epan/dissectors/packet-ber.c in the ASN.1 BER dissector in Wireshark 2.0.x before 2.0.2 does not verify that a certain length is nonzero, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet.

EPSS

Процентиль: 44%
0.00216
Низкий