Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-2530

Опубликовано: 28 фев. 2016
Источник: debian
EPSS Низкий

Описание

The dissct_rsl_ipaccess_msg function in epan/dissectors/packet-rsl.c in the RSL dissector in Wireshark 1.12.x before 1.12.10 and 2.0.x before 2.0.2 mishandles the case of an unrecognized TLV type, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet, a different vulnerability than CVE-2016-2531.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
wiresharkfixed2.0.2+ga16e22e-1package

Примечания

  • https://www.wireshark.org/security/wnpa-sec-2016-10.html

  • Affected versions: 2.0.0 to 2.0.1, 1.12.0 to 1.12.9

  • Fixed versions: 2.0.2, 1.12.10

EPSS

Процентиль: 80%
0.01429
Низкий

Связанные уязвимости

CVSS3: 5.9
ubuntu
почти 10 лет назад

The dissct_rsl_ipaccess_msg function in epan/dissectors/packet-rsl.c in the RSL dissector in Wireshark 1.12.x before 1.12.10 and 2.0.x before 2.0.2 mishandles the case of an unrecognized TLV type, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet, a different vulnerability than CVE-2016-2531.

redhat
почти 10 лет назад

The dissct_rsl_ipaccess_msg function in epan/dissectors/packet-rsl.c in the RSL dissector in Wireshark 1.12.x before 1.12.10 and 2.0.x before 2.0.2 mishandles the case of an unrecognized TLV type, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet, a different vulnerability than CVE-2016-2531.

CVSS3: 5.9
nvd
почти 10 лет назад

The dissct_rsl_ipaccess_msg function in epan/dissectors/packet-rsl.c in the RSL dissector in Wireshark 1.12.x before 1.12.10 and 2.0.x before 2.0.2 mishandles the case of an unrecognized TLV type, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet, a different vulnerability than CVE-2016-2531.

CVSS3: 5.9
github
больше 3 лет назад

The dissct_rsl_ipaccess_msg function in epan/dissectors/packet-rsl.c in the RSL dissector in Wireshark 1.12.x before 1.12.10 and 2.0.x before 2.0.2 mishandles the case of an unrecognized TLV type, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet, a different vulnerability than CVE-2016-2531.

suse-cvrf
почти 10 лет назад

Security update for wireshark

EPSS

Процентиль: 80%
0.01429
Низкий