First published: Mon Jan 04 2016(Updated: )
Buffer overflow in the tvb_uncompress function in epan/tvbuff_zlib.c in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 allows remote attackers to cause a denial of service (application crash) via a crafted packet with zlib compression.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Wireshark Wireshark | =1.12.0 | |
Wireshark Wireshark | =1.12.1 | |
Wireshark Wireshark | =1.12.2 | |
Wireshark Wireshark | =1.12.3 | |
Wireshark Wireshark | =1.12.4 | |
Wireshark Wireshark | =1.12.5 | |
Wireshark Wireshark | =1.12.6 | |
Wireshark Wireshark | =1.12.7 | |
Wireshark Wireshark | =1.12.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-8721 has a severity rating that could lead to a denial of service due to a buffer overflow vulnerability.
To fix CVE-2015-8721, you should update Wireshark to version 1.12.9 or later for the 1.12.x series, or version 2.0.1 or later for the 2.0.x series.
Wireshark versions 1.12.0 to 1.12.8 and 2.0.0 are affected by CVE-2015-8721.
CVE-2015-8721 can be exploited by remote attackers through crafted packets with zlib compression to cause application crashes.
CVE-2015-8721 impacts the tvb_uncompress function in the epan/tvbuff_zlib.c file of Wireshark.