First published: Tue May 26 2015(Updated: )
epan/dissectors/packet-websocket.c in the WebSocket dissector in Wireshark 1.12.x before 1.12.5 uses a recursive algorithm, which allows remote attackers to cause a denial of service (CPU consumption) via a crafted packet.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Wireshark Wireshark | =1.12.0 | |
Wireshark Wireshark | =1.12.1 | |
Wireshark Wireshark | =1.12.2 | |
Wireshark Wireshark | =1.12.3 | |
Wireshark Wireshark | =1.12.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-3810 is classified as a denial of service vulnerability that affects Wireshark due to high CPU consumption.
To fix CVE-2015-3810, upgrade Wireshark to version 1.12.5 or later.
CVE-2015-3810 affects Wireshark versions 1.12.0 to 1.12.4.
Yes, CVE-2015-3810 can be exploited remotely via crafted WebSocket packets.
The impact of CVE-2015-3810 is increased CPU consumption, potentially leading to a denial of service.