Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2015-8731

Опубликовано: 29 дек. 2015
Источник: redhat
CVSS2: 4.3
EPSS Низкий

Описание

The dissct_rsl_ipaccess_msg function in epan/dissectors/packet-rsl.c in the RSL dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not reject unknown TLV types, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5wiresharkWill not fix
Red Hat Enterprise Linux 6wiresharkWill not fix
Red Hat Enterprise Linux 7wiresharkWill not fix

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-125
https://bugzilla.redhat.com/show_bug.cgi?id=1296079wireshark: RSL dissector crash (wnpa-sec-2015-49)

EPSS

Процентиль: 77%
0.01042
Низкий

4.3 Medium

CVSS2

Связанные уязвимости

CVSS3: 5.5
ubuntu
около 10 лет назад

The dissct_rsl_ipaccess_msg function in epan/dissectors/packet-rsl.c in the RSL dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not reject unknown TLV types, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet.

CVSS3: 5.5
nvd
около 10 лет назад

The dissct_rsl_ipaccess_msg function in epan/dissectors/packet-rsl.c in the RSL dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not reject unknown TLV types, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet.

CVSS3: 5.5
debian
около 10 лет назад

The dissct_rsl_ipaccess_msg function in epan/dissectors/packet-rsl.c i ...

CVSS3: 5.5
github
больше 3 лет назад

The dissct_rsl_ipaccess_msg function in epan/dissectors/packet-rsl.c in the RSL dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not reject unknown TLV types, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet.

suse-cvrf
около 10 лет назад

Security update for wireshark

EPSS

Процентиль: 77%
0.01042
Низкий

4.3 Medium

CVSS2