Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2016-4085

Опубликовано: 22 апр. 2016
Источник: redhat
CVSS2: 4.3
EPSS Низкий

Описание

Stack-based buffer overflow in epan/dissectors/packet-ncp2222.inc in the NCP dissector in Wireshark 1.12.x before 1.12.11 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a long string in a packet.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5wiresharkWill not fix
Red Hat Enterprise Linux 6wiresharkWill not fix
Red Hat Enterprise Linux 7wiresharkWill not fix

Показывать по

Дополнительная информация

Статус:

Moderate
https://bugzilla.redhat.com/show_bug.cgi?id=1330077wireshark: NCP dissector crash (wnpa-sec-2016-28)

EPSS

Процентиль: 75%
0.00884
Низкий

4.3 Medium

CVSS2

Связанные уязвимости

CVSS3: 5.9
ubuntu
почти 10 лет назад

Stack-based buffer overflow in epan/dissectors/packet-ncp2222.inc in the NCP dissector in Wireshark 1.12.x before 1.12.11 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a long string in a packet.

CVSS3: 5.9
nvd
почти 10 лет назад

Stack-based buffer overflow in epan/dissectors/packet-ncp2222.inc in the NCP dissector in Wireshark 1.12.x before 1.12.11 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a long string in a packet.

CVSS3: 5.9
debian
почти 10 лет назад

Stack-based buffer overflow in epan/dissectors/packet-ncp2222.inc in t ...

CVSS3: 5.9
github
больше 3 лет назад

Stack-based buffer overflow in epan/dissectors/packet-ncp2222.inc in the NCP dissector in Wireshark 1.12.x before 1.12.11 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a long string in a packet.

EPSS

Процентиль: 75%
0.00884
Низкий

4.3 Medium

CVSS2