Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2015-8723

Опубликовано: 04 янв. 2016
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 4.3
CVSS3: 5.5

Описание

The AirPDcapPacketProcess function in epan/crypt/airpdcap.c in the 802.11 dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the relationship between the total length and the capture length, which allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) via a crafted packet.

РелизСтатусПримечание
artful

not-affected

bionic

not-affected

devel

not-affected

esm-apps/bionic

not-affected

esm-apps/xenial

not-affected

2.0.2+ga16e22e-1
esm-infra-legacy/trusty

released

1.12.1+g01b65bf-4+deb8u11ubuntu0.14.04.1
precise

ignored

end of life
precise/esm

DNE

precise was needed
trusty

released

1.12.1+g01b65bf-4+deb8u11ubuntu0.14.04.1
trusty/esm

released

1.12.1+g01b65bf-4+deb8u11ubuntu0.14.04.1

Показывать по

EPSS

Процентиль: 79%
0.01257
Низкий

4.3 Medium

CVSS2

5.5 Medium

CVSS3

Связанные уязвимости

redhat
около 10 лет назад

The AirPDcapPacketProcess function in epan/crypt/airpdcap.c in the 802.11 dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the relationship between the total length and the capture length, which allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) via a crafted packet.

CVSS3: 5.5
nvd
около 10 лет назад

The AirPDcapPacketProcess function in epan/crypt/airpdcap.c in the 802.11 dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the relationship between the total length and the capture length, which allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) via a crafted packet.

CVSS3: 5.5
debian
около 10 лет назад

The AirPDcapPacketProcess function in epan/crypt/airpdcap.c in the 802 ...

CVSS3: 5.5
github
больше 3 лет назад

The AirPDcapPacketProcess function in epan/crypt/airpdcap.c in the 802.11 dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the relationship between the total length and the capture length, which allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) via a crafted packet.

suse-cvrf
около 10 лет назад

Security update for wireshark

EPSS

Процентиль: 79%
0.01257
Низкий

4.3 Medium

CVSS2

5.5 Medium

CVSS3