Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2015-3814

Опубликовано: 26 мая 2015
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 5

Описание

The (1) dissect_tfs_request and (2) dissect_tfs_response functions in epan/dissectors/packet-ieee80211.c in the IEEE 802.11 dissector in Wireshark 1.10.x before 1.10.14 and 1.12.x before 1.12.5 interpret a zero value as a length rather than an error condition, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.

РелизСтатусПримечание
artful

not-affected

1.12.5+g5819e5b-1
bionic

released

2.6.3-1~ubuntu18.04.1
devel

not-affected

2.6.3-1
esm-apps/bionic

released

2.6.3-1~ubuntu18.04.1
esm-apps/xenial

released

2.6.3-1~ubuntu16.04.1
esm-infra-legacy/trusty

released

2.6.3-1~ubuntu14.04.1
precise

ignored

end of life
precise/esm

DNE

precise was needs-triage
trusty

released

2.6.3-1~ubuntu14.04.1
trusty/esm

released

2.6.3-1~ubuntu14.04.1

Показывать по

EPSS

Процентиль: 41%
0.00189
Низкий

5 Medium

CVSS2

Связанные уязвимости

redhat
больше 10 лет назад

The (1) dissect_tfs_request and (2) dissect_tfs_response functions in epan/dissectors/packet-ieee80211.c in the IEEE 802.11 dissector in Wireshark 1.10.x before 1.10.14 and 1.12.x before 1.12.5 interpret a zero value as a length rather than an error condition, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.

nvd
больше 10 лет назад

The (1) dissect_tfs_request and (2) dissect_tfs_response functions in epan/dissectors/packet-ieee80211.c in the IEEE 802.11 dissector in Wireshark 1.10.x before 1.10.14 and 1.12.x before 1.12.5 interpret a zero value as a length rather than an error condition, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.

debian
больше 10 лет назад

The (1) dissect_tfs_request and (2) dissect_tfs_response functions in ...

github
больше 3 лет назад

The (1) dissect_tfs_request and (2) dissect_tfs_response functions in epan/dissectors/packet-ieee80211.c in the IEEE 802.11 dissector in Wireshark 1.10.x before 1.10.14 and 1.12.x before 1.12.5 interpret a zero value as a length rather than an error condition, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.

suse-cvrf
больше 10 лет назад

Security update for wireshark

EPSS

Процентиль: 41%
0.00189
Низкий

5 Medium

CVSS2