Описание
The fragment_add_work function in epan/reassemble.c in the packet-reassembly feature in Wireshark 1.12.x before 1.12.5 does not properly determine the defragmentation state in a case of an insufficient snapshot length, which allows remote attackers to cause a denial of service (memory consumption) via a crafted packet.
Релиз | Статус | Примечание |
---|---|---|
devel | not-affected | 1.12.5+g5819e5b-1 |
esm-infra-legacy/trusty | not-affected | 1.10.6-1 |
precise | not-affected | |
trusty | not-affected | 1.10.6-1 |
trusty/esm | not-affected | 1.10.6-1 |
upstream | released | 1.12.5+g5819e5b-1 |
utopic | ignored | end of life |
vivid | released | 1.12.1+g01b65bf-4+deb8u1build0.15.04.1 |
Показывать по
EPSS
5 Medium
CVSS2
Связанные уязвимости
The fragment_add_work function in epan/reassemble.c in the packet-reassembly feature in Wireshark 1.12.x before 1.12.5 does not properly determine the defragmentation state in a case of an insufficient snapshot length, which allows remote attackers to cause a denial of service (memory consumption) via a crafted packet.
The fragment_add_work function in epan/reassemble.c in the packet-reassembly feature in Wireshark 1.12.x before 1.12.5 does not properly determine the defragmentation state in a case of an insufficient snapshot length, which allows remote attackers to cause a denial of service (memory consumption) via a crafted packet.
The fragment_add_work function in epan/reassemble.c in the packet-reas ...
The fragment_add_work function in epan/reassemble.c in the packet-reassembly feature in Wireshark 1.12.x before 1.12.5 does not properly determine the defragmentation state in a case of an insufficient snapshot length, which allows remote attackers to cause a denial of service (memory consumption) via a crafted packet.
EPSS
5 Medium
CVSS2