ID CVE-2015-3813
Summary The fragment_add_work function in epan/reassemble.c in the packet-reassembly feature in Wireshark 1.12.x before 1.12.5 does not properly determine the defragmentation state in a case of an insufficient snapshot length, which allows remote attackers to cause a denial of service (memory consumption) via a crafted packet.
References
Vulnerable Configurations
  • cpe:2.3:a:wireshark:wireshark:1.12.0:*:*:*:*:*:*:*
    cpe:2.3:a:wireshark:wireshark:1.12.0:*:*:*:*:*:*:*
  • cpe:2.3:a:wireshark:wireshark:1.12.1:*:*:*:*:*:*:*
    cpe:2.3:a:wireshark:wireshark:1.12.1:*:*:*:*:*:*:*
  • cpe:2.3:a:wireshark:wireshark:1.12.2:*:*:*:*:*:*:*
    cpe:2.3:a:wireshark:wireshark:1.12.2:*:*:*:*:*:*:*
  • cpe:2.3:a:wireshark:wireshark:1.12.3:*:*:*:*:*:*:*
    cpe:2.3:a:wireshark:wireshark:1.12.3:*:*:*:*:*:*:*
  • cpe:2.3:a:wireshark:wireshark:1.12.4:*:*:*:*:*:*:*
    cpe:2.3:a:wireshark:wireshark:1.12.4:*:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 05-01-2018 - 02:30)
Impact:
Exploitability:
CWE CWE-399
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:N/I:N/A:P
redhat via4
advisories
bugzilla
id 1240675
title No dissection of the TLS Certificate Verify message
oval
AND
  • OR
    • comment Red Hat Enterprise Linux 6 Client is installed
      oval oval:com.redhat.rhba:tst:20111656001
    • comment Red Hat Enterprise Linux 6 Server is installed
      oval oval:com.redhat.rhba:tst:20111656002
    • comment Red Hat Enterprise Linux 6 Workstation is installed
      oval oval:com.redhat.rhba:tst:20111656003
    • comment Red Hat Enterprise Linux 6 ComputeNode is installed
      oval oval:com.redhat.rhba:tst:20111656004
  • OR
    • AND
      • comment wireshark is earlier than 0:1.8.10-25.el6
        oval oval:com.redhat.rhsa:tst:20170631009
      • comment wireshark is signed with Red Hat redhatrelease2 key
        oval oval:com.redhat.rhsa:tst:20100924006
    • AND
      • comment wireshark-devel is earlier than 0:1.8.10-25.el6
        oval oval:com.redhat.rhsa:tst:20170631005
      • comment wireshark-devel is signed with Red Hat redhatrelease2 key
        oval oval:com.redhat.rhsa:tst:20100924010
    • AND
      • comment wireshark-gnome is earlier than 0:1.8.10-25.el6
        oval oval:com.redhat.rhsa:tst:20170631007
      • comment wireshark-gnome is signed with Red Hat redhatrelease2 key
        oval oval:com.redhat.rhsa:tst:20100924008
rhsa
id RHSA-2017:0631
released 2017-03-21
severity Moderate
title RHSA-2017:0631: wireshark security and bug fix update (Moderate)
rpms
  • wireshark-0:1.10.14-7.el7
  • wireshark-devel-0:1.10.14-7.el7
  • wireshark-gnome-0:1.10.14-7.el7
  • wireshark-0:1.8.10-25.el6
  • wireshark-devel-0:1.8.10-25.el6
  • wireshark-gnome-0:1.8.10-25.el6
refmap via4
bid 74633
confirm
debian DSA-3277
gentoo GLSA-201510-03
Last major update 05-01-2018 - 02:30
Published 26-05-2015 - 15:59
Back to Top