First published: Sat Aug 06 2016(Updated: )
epan/dissectors/packet-packetbb.c in the PacketBB dissector in Wireshark 1.12.x before 1.12.13 and 2.x before 2.0.5 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted packet.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Wireshark Wireshark | =1.12.0 | |
Wireshark Wireshark | =1.12.1 | |
Wireshark Wireshark | =1.12.2 | |
Wireshark Wireshark | =1.12.3 | |
Wireshark Wireshark | =1.12.4 | |
Wireshark Wireshark | =1.12.5 | |
Wireshark Wireshark | =1.12.6 | |
Wireshark Wireshark | =1.12.7 | |
Wireshark Wireshark | =1.12.8 | |
Wireshark Wireshark | =1.12.9 | |
Wireshark Wireshark | =1.12.10 | |
Wireshark Wireshark | =1.12.11 | |
Wireshark Wireshark | =1.12.12 | |
Wireshark Wireshark | =2.0.0 | |
Wireshark Wireshark | =2.0.1 | |
Wireshark Wireshark | =2.0.2 | |
Wireshark Wireshark | =2.0.3 | |
Wireshark Wireshark | =2.0.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-6505 has been classified as a denial of service vulnerability allowing remote attackers to crash the application.
To fix CVE-2016-6505, upgrade to Wireshark version 1.12.13 or 2.0.5 or later as these versions include the necessary patches.
CVE-2016-6505 affects Wireshark versions 1.12.0 through 1.12.12 and 2.0.0 through 2.0.4.
CVE-2016-6505 allows remote attackers to perform denial of service attacks by sending crafted packets that lead to an application crash.
There have been reports of exploitation attempts in the wild leveraging the vulnerability in CVE-2016-6505.