The detect_version function in wiretap/logcat.c in the Android Logcat file
parser in Wireshark 1.12.x before 1.12.5 does not check the length of the
payload, which allows remote attackers to cause a denial of service
(out-of-bounds read and application crash) via a packet with a crafted
payload, as demonstrated by a length of zero, a different vulnerability
than CVE-2015-3906.
blog.fuzzing-project.org/11-Read-heap-overflow-invalid-memory-access-in-Wireshark-TFPA-0072015.html
launchpad.net/bugs/cve/CVE-2015-3815
nvd.nist.gov/vuln/detail/CVE-2015-3815
security-tracker.debian.org/tracker/CVE-2015-3815
www.cve.org/CVERecord?id=CVE-2015-3815
www.wireshark.org/security/wnpa-sec-2015-18.html