First published: Mon Jan 04 2016(Updated: )
The mp2t_find_next_pcr function in wiretap/mp2t.c in the MP2T file parser in Wireshark 2.0.x before 2.0.1 does not reserve memory for a trailer, which allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) via a crafted file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Wireshark | =2.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-8736 is classified as a denial of service vulnerability due to stack-based buffer overflow.
To fix CVE-2015-8736, upgrade to Wireshark version 2.0.1 or later to address the vulnerability.
Wireshark version 2.0.0 is affected by CVE-2015-8736.
CVE-2015-8736 enables remote attackers to execute a denial of service attack, causing application crashes.
The vulnerability is located in the mp2t_find_next_pcr function of the MP2T file parser in Wireshark.