Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2015-8733

Опубликовано: 04 янв. 2016
Источник: ubuntu
Приоритет: medium
CVSS2: 4.3
CVSS3: 5.5

Описание

The ngsniffer_process_record function in wiretap/ngsniffer.c in the Sniffer file parser in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the relationships between record lengths and record header lengths, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted file.

РелизСтатусПримечание
artful

ignored

end of life
bionic

released

2.6.3-1~ubuntu18.04.1
devel

not-affected

2.6.3-1
esm-apps/bionic

released

2.6.3-1~ubuntu18.04.1
esm-apps/xenial

released

2.6.3-1~ubuntu16.04.1
esm-infra-legacy/trusty

released

2.6.3-1~ubuntu14.04.1
precise

ignored

end of life
precise/esm

DNE

precise was needed
trusty

released

2.6.3-1~ubuntu14.04.1
trusty/esm

released

2.6.3-1~ubuntu14.04.1

Показывать по

4.3 Medium

CVSS2

5.5 Medium

CVSS3

Связанные уязвимости

redhat
около 10 лет назад

The ngsniffer_process_record function in wiretap/ngsniffer.c in the Sniffer file parser in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the relationships between record lengths and record header lengths, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted file.

CVSS3: 5.5
nvd
около 10 лет назад

The ngsniffer_process_record function in wiretap/ngsniffer.c in the Sniffer file parser in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the relationships between record lengths and record header lengths, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted file.

CVSS3: 5.5
debian
около 10 лет назад

The ngsniffer_process_record function in wiretap/ngsniffer.c in the Sn ...

CVSS3: 5.5
github
больше 3 лет назад

The ngsniffer_process_record function in wiretap/ngsniffer.c in the Sniffer file parser in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the relationships between record lengths and record header lengths, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted file.

suse-cvrf
около 10 лет назад

Security update for wireshark

4.3 Medium

CVSS2

5.5 Medium

CVSS3