First published: Sun Feb 28 2016(Updated: )
The dissect_nhdr_extopt function in epan/dissectors/packet-lbmc.c in the LBMC dissector in Wireshark 2.0.x before 2.0.2 does not validate length values, which allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) via a crafted packet.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Wireshark Wireshark | =2.0.0 | |
Wireshark Wireshark | =2.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-2528 has a high severity rating due to its potential to cause a denial of service through stack-based buffer overflow.
To fix CVE-2016-2528, upgrade Wireshark to version 2.0.2 or later, which addresses the vulnerability.
CVE-2016-2528 affects users of Wireshark versions 2.0.0 and 2.0.1.
CVE-2016-2528 enables remote attackers to conduct denial of service attacks resulting in application crashes.
CVE-2016-2528 is related to the LBMC dissector in the Wireshark application.