Lucene search

K
archlinuxArch LinuxASA-201601-6
HistoryJan 09, 2016 - 12:00 a.m.

wireshark-qt: denial of service

2016-01-0900:00:00
Arch Linux
lists.archlinux.org
17

5.5 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

0.003 Low

EPSS

Percentile

67.3%

  • CVE-2015-8742 (denial of service)
    The dissect_CPMSetBindings function in epan/dissectors/packet-mswsp.c
    in the MS-WSP dissector in Wireshark 2.0.x before 2.0.1 does not
    validate the column size, which allows remote attackers to cause a
    denial of service (memory consumption or application crash) via a
    crafted packet.

  • CVE-2015-8741 (denial of service)
    The dissect_ppi function in epan/dissectors/packet-ppi.c in the PPI
    dissector in Wireshark 2.0.x before 2.0.1 does not initialize a
    packet-header data structure, which allows remote attackers to cause a
    denial of service (application crash) via a crafted packet.

  • CVE-2015-8740 (denial of service)
    The dissect_tds7_colmetadata_token function in
    epan/dissectors/packet-tds.c in the TDS dissector in Wireshark 2.0.x
    before 2.0.1 does not validate the number of columns, which allows
    remote attackers to cause a denial of service (stack-based buffer
    overflow and application crash) via a crafted packet.

  • CVE-2015-8738 (denial of service)
    The s7comm_decode_ud_cpu_szl_subfunc function in
    epan/dissectors/packet-s7comm_szl_ids.c in the S7COMM dissector in
    Wireshark 2.0.x before 2.0.1 does not validate the list count in an
    SZL response, which allows remote attackers to cause a denial of
    service (divide-by-zero error and application crash) via a crafted
    packet.

  • CVE-2015-8739 (denial of service)
    The ipmi_fmt_udpport function in epan/dissectors/packet-ipmi.c in the
    IPMI dissector in Wireshark 2.0.x before 2.0.1 improperly attempts to
    access a packet scope, which allows remote attackers to cause a denial
    of service (assertion failure and application exit) via a crafted
    packet.

  • CVE-2015-8737 (denial of service)
    The mp2t_open function in wiretap/mp2t.c in the MP2T file parser in
    Wireshark 2.0.x before 2.0.1 does not validate the bit rate, which
    allows remote attackers to cause a denial of service (divide-by-zero
    error and application crash) via a crafted file.

  • CVE-2015-8736 (denial of service)
    The mp2t_find_next_pcr function in wiretap/mp2t.c in the MP2T file
    parser in Wireshark 2.0.x before 2.0.1 does not reserve memory for a
    trailer, which allows remote attackers to cause a denial of service
    (stack-based buffer overflow and application crash) via a crafted
    file.

  • CVE-2015-8735 (denial of service)
    The get_value function in epan/dissectors/packet-btatt.c in the
    Bluetooth Attribute (aka BT ATT) dissector in Wireshark 2.0.x before
    2.0.1 uses an incorrect integer data type, which allows remote
    attackers to cause a denial of service (invalid write operation and
    application crash) via a crafted packet.

  • CVE-2015-8734 (denial of service)
    The dissect_nwp function in epan/dissectors/packet-nwp.c in the NWP
    dissector in Wireshark 2.0.x before 2.0.1 mishandles the packet type,
    which allows remote attackers to cause a denial of service
    (application crash) via a crafted packet.

  • CVE-2015-8733 (denial of service)
    The ngsniffer_process_record function in wiretap/ngsniffer.c in the
    Sniffer file parser in Wireshark 1.12.x before 1.12.9 and 2.0.x before
    2.0.1 does not validate the relationships between record lengths and
    record header lengths, which allows remote attackers to cause a denial
    of service (out-of-bounds read and application crash) via a crafted
    file.

  • CVE-2015-8732 (denial of service)
    The dissect_zcl_pwr_prof_pwrprofstatersp function in
    epan/dissectors/packet-zbee-zcl-general.c in the ZigBee ZCL dissector
    in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not
    validate the Total Profile Number field, which allows remote attackers
    to cause a denial of service (out-of-bounds read and application
    crash) via a crafted packet.

  • CVE-2015-8730 (denial of service)
    epan/dissectors/packet-nbap.c in the NBAP dissector in Wireshark
    1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the
    number of items, which allows remote attackers to cause a denial of
    service (invalid read operation and application crash) via a crafted
    packet.

  • CVE-2015-8731 (denial of service)
    The dissct_rsl_ipaccess_msg function in epan/dissectors/packet-rsl.c
    in the RSL dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x
    before 2.0.1 does not reject unknown TLV types, which allows remote
    attackers to cause a denial of service (out-of-bounds read and
    application crash) via a crafted packet.

  • CVE-2015-8729 (denial of service)
    The ascend_seek function in wiretap/ascendtext.c in the Ascend file
    parser in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does
    not ensure the presence of a ‘\0’ character at the end of a date
    string, which allows remote attackers to cause a denial of service
    (out-of-bounds read and application crash) via a crafted file.

  • CVE-2015-8728 (denial of service)
    The Mobile Identity parser in (1) epan/dissectors/packet-ansi_a.c in
    the ANSI A dissector and (2) epan/dissectors/packet-gsm_a_common.c in
    the GSM A dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before
    2.0.1 improperly uses the tvb_bcd_dig_to_wmem_packet_str function,
    which allows remote attackers to cause a denial of service (buffer
    overflow and application crash) via a crafted packet.

  • CVE-2015-8727 (denial of service)
    The dissect_rsvp_common function in epan/dissectors/packet-rsvp.c in
    the RSVP dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before
    2.0.1 does not properly maintain request-key data, which allows remote
    attackers to cause a denial of service (use-after-free and application
    crash) via a crafted packet

  • CVE-2015-8726 (denial of service)
    wiretap/vwr.c in the VeriWave file parser in Wireshark 1.12.x before
    1.12.9 and 2.0.x before 2.0.1 does not validate certain signature and
    Modulation and Coding Scheme (MCS) data, which allows remote attackers
    to cause a denial of service (out-of-bounds read and application
    crash) via a crafted file.

  • CVE-2015-8725 (denial of service)
    The dissect_diameter_base_framed_ipv6_prefix function in
    epan/dissectors/packet-diameter.c in the DIAMETER dissector in
    Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not
    validate the IPv6 prefix length, which allows remote attackers to
    cause a denial of service (stack-based buffer overflow and application
    crash) via a crafted packet.

  • CVE-2015-8724 (denial of service)
    The AirPDcapDecryptWPABroadcastKey function in epan/crypt/airpdcap.c
    in the 802.11 dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x
    before 2.0.1 does not verify the WPA broadcast key length, which
    allows remote attackers to cause a denial of service (out-of-bounds
    read and application crash) via a crafted packet.

  • CVE-2015-8723 (denial of service)
    The AirPDcapPacketProcess function in epan/crypt/airpdcap.c in the
    802.11 dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before
    2.0.1 does not validate the relationship between the total length and
    the capture length, which allows remote attackers to cause a denial of
    service (stack-based buffer overflow and application crash) via a
    crafted packet.

  • CVE-2015-8722 (denial of service)
    epan/dissectors/packet-sctp.c in the SCTP dissector in Wireshark
    1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the
    frame pointer, which allows remote attackers to cause a denial of
    service (NULL pointer dereference and application crash) via a crafted
    packet.

  • CVE-2015-8721 (denial of service)
    Buffer overflow in the tvb_uncompress function in epan/tvbuff_zlib.c
    in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 allows remote
    attackers to cause a denial of service (application crash) via a
    crafted packet with zlib compression.

  • CVE-2015-8720 (denial of service)
    The dissect_ber_GeneralizedTime function in
    epan/dissectors/packet-ber.c in the BER dissector in Wireshark 1.12.x
    before 1.12.9 and 2.0.x before 2.0.1 improperly checks an sscanf
    return value, which allows remote attackers to cause a denial of
    service (application crash) via a crafted packet.

  • CVE-2015-8718 (denial of service)
    Double free vulnerability in epan/dissectors/packet-nlm.c in the NLM
    dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1,
    when the "Match MSG/RES packets for async NLM" option is enabled,
    allows remote attackers to cause a denial of service (application
    crash) via a crafted packet.

  • CVE-2015-8711 (denial of service)
    epan/dissectors/packet-nbap.c in the NBAP dissector in Wireshark
    1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate
    conversation data, which allows remote attackers to cause a denial of
    service (NULL pointer dereference and application crash) via a crafted
    packet.

OSVersionArchitecturePackageVersionFilename
anyanyanywireshark-qt< 2.0.1-1UNKNOWN

References

5.5 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

0.003 Low

EPSS

Percentile

67.3%