First published: Mon Jan 04 2016(Updated: )
The ngsniffer_process_record function in wiretap/ngsniffer.c in the Sniffer file parser in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the relationships between record lengths and record header lengths, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Wireshark Wireshark | =1.12.0 | |
Wireshark Wireshark | =1.12.1 | |
Wireshark Wireshark | =1.12.2 | |
Wireshark Wireshark | =1.12.3 | |
Wireshark Wireshark | =1.12.4 | |
Wireshark Wireshark | =1.12.5 | |
Wireshark Wireshark | =1.12.6 | |
Wireshark Wireshark | =1.12.7 | |
Wireshark Wireshark | =1.12.8 | |
Wireshark Wireshark | =2.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-8733 has been classified as a denial of service vulnerability.
To fix CVE-2015-8733, you should upgrade to Wireshark version 1.12.9 or 2.0.1 or later.
CVE-2015-8733 affects Wireshark versions 1.12.0 through 1.12.8 and 2.0.0.
CVE-2015-8733 can lead to a denial of service, potentially crashing the application.
Yes, CVE-2015-8733 can be exploited by remote attackers to cause denial of service.