KLA10796
Multiple vulnerabilities in Wireshark

Updated: 06/03/2020
Detect date
?
04/25/2016
Severity
?
Warning
Description

Multiple vulnerabilities were found in Wireshark. By exploiting these vulnerabilities malicious users can cause denial of service. These vulnerabilities can be exploited remotely by injecting malformed packet.


Technical details

These vulnerabilities can be exploited remotely via a vectors related to stack-based buffer overflow and improper memory initialisation for search patterns in NCP dissector, integer signedness error and improper memory objects handling in the MS-WSP dissector, using wrong variable for indexing an array in the GSM CBCH dissector, using incorrect integer data type in the IAX2 dissector, misparsing timestamp fields and absence of verification of BER identifiers in the PKTC dissector, improper restrictions of element list in IEEE 802.11 dissector, incorrect special-case handling of truncated Tvb data structures, impoper limitations of protocol-tree depth.

Affected products

Wireshark 1.12 versions earlier than 1.12.11.
Wireshark 2.0 versions earlier than 2.0.3
Wireshark 1.12 versions earlier than 1.12.11.
Wireshark 2.0 versions earlier than 2.0.3

Solution

Update to the latest version
Download Wireshark

Original advisories

Wireshark Security Advisories

Impacts
?
DoS 
[?]
Related products
Wireshark
CVE-IDS
?
CVE-2016-40854.3Warning
CVE-2016-40844.3Warning
CVE-2016-40834.3Warning
CVE-2016-40824.3Warning
CVE-2016-40814.3Warning
CVE-2016-40804.3Warning
CVE-2016-40794.3Warning
CVE-2016-40784.3Warning
CVE-2016-40774.3Warning
CVE-2016-40764.3Warning
CVE-2016-40064.3Warning
Find out the statistics of the vulnerabilities spreading in your region