The dissect_nbap_T_dCH_ID function in epan/dissectors/packet-nbap.c in the NBAP dissector in Wireshark 1.8.x before 1.8.10 and 1.10.x before 1.10.2 does not restrict the dch_id value, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 12 | all | wireshark | < 1.10.2-1 | wireshark_1.10.2-1_all.deb |
Debian | 11 | all | wireshark | < 1.10.2-1 | wireshark_1.10.2-1_all.deb |
Debian | 10 | all | wireshark | < 1.10.2-1 | wireshark_1.10.2-1_all.deb |
Debian | 999 | all | wireshark | < 1.10.2-1 | wireshark_1.10.2-1_all.deb |
Debian | 13 | all | wireshark | < 1.10.2-1 | wireshark_1.10.2-1_all.deb |