First published: Mon Jan 04 2016(Updated: )
The AirPDcapPacketProcess function in epan/crypt/airpdcap.c in the 802.11 dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the relationship between the total length and the capture length, which allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) via a crafted packet.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Wireshark Wireshark | =1.12.0 | |
Wireshark Wireshark | =1.12.1 | |
Wireshark Wireshark | =1.12.2 | |
Wireshark Wireshark | =1.12.3 | |
Wireshark Wireshark | =1.12.4 | |
Wireshark Wireshark | =1.12.5 | |
Wireshark Wireshark | =1.12.6 | |
Wireshark Wireshark | =1.12.7 | |
Wireshark Wireshark | =1.12.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-8723 has a severity rating that classifies it as potentially critical due to its ability to cause a denial of service.
To fix CVE-2015-8723, users should upgrade to Wireshark version 1.12.9 or 2.0.1 or later.
CVE-2015-8723 affects Wireshark versions 1.12.0 to 1.12.8 and 2.0.0 to 2.0.0.
The impact of CVE-2015-8723 on users includes a potential crash of the Wireshark application due to stack-based buffer overflow.
Yes, CVE-2015-8723 can be exploited remotely by attackers sending crafted packets to the Wireshark application.