First published: Mon Jan 04 2016(Updated: )
wiretap/vwr.c in the VeriWave file parser in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate certain signature and Modulation and Coding Scheme (MCS) data, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Wireshark Wireshark | =1.12.0 | |
Wireshark Wireshark | =1.12.1 | |
Wireshark Wireshark | =1.12.2 | |
Wireshark Wireshark | =1.12.3 | |
Wireshark Wireshark | =1.12.4 | |
Wireshark Wireshark | =1.12.5 | |
Wireshark Wireshark | =1.12.6 | |
Wireshark Wireshark | =1.12.7 | |
Wireshark Wireshark | =1.12.8 | |
Wireshark Wireshark | =2.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2015-8726 is classified as high due to its potential for crashing the application.
To fix CVE-2015-8726, upgrade Wireshark to version 1.12.9 or 2.0.1 or later.
CVE-2015-8726 affects Wireshark versions 1.12.0 to 1.12.8 and 2.0.0.
CVE-2015-8726 is associated with a denial of service exploit resulting from an out-of-bounds read.
It is not recommended to continue using affected versions of Wireshark as they are vulnerable to crashes.