First published: Mon Jan 04 2016(Updated: )
The s7comm_decode_ud_cpu_szl_subfunc function in epan/dissectors/packet-s7comm_szl_ids.c in the S7COMM dissector in Wireshark 2.0.x before 2.0.1 does not validate the list count in an SZL response, which allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted packet.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Wireshark | =2.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-8738 has a severity rating that indicates a denial of service vulnerability, allowing an attacker to crash the application.
To fix CVE-2015-8738, upgrade Wireshark to version 2.0.1 or later.
CVE-2015-8738 affects Wireshark version 2.0.0.
CVE-2015-8738 can allow remote attackers to execute a denial of service attack through a divide-by-zero error.
Yes, CVE-2015-8738 is patched in Wireshark version 2.0.1 and later.