Дата обнаружения
|
25/04/2016 |
Уровень угрозы
|
Warning |
Описание
|
Multiple vulnerabilities were found in Wireshark. By exploiting these vulnerabilities malicious users can cause denial of service. These vulnerabilities can be exploited remotely by injecting malformed packet. Technical details These vulnerabilities can be exploited remotely via a vectors related to stack-based buffer overflow and improper memory initialisation for search patterns in NCP dissector, integer signedness error and improper memory objects handling in the MS-WSP dissector, using wrong variable for indexing an array in the GSM CBCH dissector, using incorrect integer data type in the IAX2 dissector, misparsing timestamp fields and absence of verification of BER identifiers in the PKTC dissector, improper restrictions of element list in IEEE 802.11 dissector, incorrect special-case handling of truncated Tvb data structures, impoper limitations of protocol-tree depth. |
Пораженные продукты
|
Wireshark 1.12 versions earlier than 1.12.11. |
Решение
|
Update to the latest version |
Первичный источник обнаружения
|
Wireshark Security Advisories |
Оказываемое влияние
?
|
DoS
[?]
|
Связанные продукты
|
Wireshark |
CVE-IDS
|
CVE-2016-40854.3Warning
CVE-2016-40844.3Warning CVE-2016-40834.3Warning CVE-2016-40824.3Warning CVE-2016-40814.3Warning CVE-2016-40804.3Warning CVE-2016-40794.3Warning CVE-2016-40784.3Warning CVE-2016-40774.3Warning CVE-2016-40764.3Warning CVE-2016-40064.3Warning |
Узнай статистику распространения уязвимостей в твоем регионе |