Описание
The ptvcursor_add function in the ptvcursor implementation in epan/proto.c in Wireshark 1.12.x before 1.12.7 does not check whether the expected amount of data is available, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
Релиз | Статус | Примечание |
---|---|---|
artful | not-affected | |
bionic | released | 2.6.3-1~ubuntu18.04.1 |
devel | not-affected | 2.6.3-1 |
esm-apps/bionic | released | 2.6.3-1~ubuntu18.04.1 |
esm-apps/xenial | released | 2.6.3-1~ubuntu16.04.1 |
esm-infra-legacy/trusty | released | 2.6.3-1~ubuntu14.04.1 |
precise | ignored | end of life |
precise/esm | DNE | precise was needed |
trusty | released | 2.6.3-1~ubuntu14.04.1 |
trusty/esm | released | 2.6.3-1~ubuntu14.04.1 |
Показывать по
Ссылки на источники
EPSS
4.3 Medium
CVSS2
Связанные уязвимости
The ptvcursor_add function in the ptvcursor implementation in epan/proto.c in Wireshark 1.12.x before 1.12.7 does not check whether the expected amount of data is available, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
The ptvcursor_add function in the ptvcursor implementation in epan/proto.c in Wireshark 1.12.x before 1.12.7 does not check whether the expected amount of data is available, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
The ptvcursor_add function in the ptvcursor implementation in epan/pro ...
The ptvcursor_add function in the ptvcursor implementation in epan/proto.c in Wireshark 1.12.x before 1.12.7 does not check whether the expected amount of data is available, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
EPSS
4.3 Medium
CVSS2