The (1) dissect_tfs_request and (2) dissect_tfs_response functions in epan/dissectors/packet-ieee80211.c in the IEEE 802.11 dissector in Wireshark 1.10.x before 1.10.14 and 1.12.x before 1.12.5 interpret a zero value as a length rather than an error condition, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 12 | all | wireshark | < 1.12.5+g5819e5b-1 | wireshark_1.12.5+g5819e5b-1_all.deb |
Debian | 11 | all | wireshark | < 1.12.5+g5819e5b-1 | wireshark_1.12.5+g5819e5b-1_all.deb |
Debian | 10 | all | wireshark | < 1.12.5+g5819e5b-1 | wireshark_1.12.5+g5819e5b-1_all.deb |
Debian | 999 | all | wireshark | < 1.12.5+g5819e5b-1 | wireshark_1.12.5+g5819e5b-1_all.deb |
Debian | 13 | all | wireshark | < 1.12.5+g5819e5b-1 | wireshark_1.12.5+g5819e5b-1_all.deb |