First published: Sun Mar 08 2015(Updated: )
The dissect_atn_cpdlc_heur function in asn1/atn-cpdlc/packet-atn-cpdlc-template.c in the ATN-CPDLC dissector in Wireshark 1.12.x before 1.12.4 does not properly follow the TRY/ENDTRY code requirements, which allows remote attackers to cause a denial of service (stack memory corruption and application crash) via a crafted packet.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
openSUSE libeconf | =13.1 | |
openSUSE libeconf | =13.2 | |
Wireshark | =1.12.0 | |
Wireshark | =1.12.1 | |
Wireshark | =1.12.2 | |
Wireshark | =1.12.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-2187 has been assigned a severity rating that indicates it can lead to a denial of service due to stack memory corruption.
To fix CVE-2015-2187, upgrade to Wireshark version 1.12.4 or later, or apply available patches.
Wireshark versions 1.12.0 to 1.12.3 are affected by CVE-2015-2187.
Yes, CVE-2015-2187 can be exploited remotely, allowing an attacker to cause a denial of service.
CVE-2015-2187 facilitates a denial of service attack through stack memory corruption.