CVE-2015-6247
Published: 24 August 2015
The dissect_openflow_tablemod_v5 function in epan/dissectors/packet-openflow_v5.c in the OpenFlow dissector in Wireshark 1.12.x before 1.12.7 does not validate a certain offset value, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
Priority
Status
Package | Release | Status |
---|---|---|
wireshark Launchpad, Ubuntu, Debian |
artful |
Not vulnerable
|
bionic |
Released
(2.6.3-1~ubuntu18.04.1)
|
|
precise |
Ignored
(end of life)
|
|
trusty |
Released
(2.6.3-1~ubuntu14.04.1)
|
|
upstream |
Released
(1.12.7)
|
|
vivid |
Released
(1.12.1+g01b65bf-4+deb8u3build0.15.04.1)
|
|
wily |
Not vulnerable
|
|
xenial |
Released
(2.6.3-1~ubuntu16.04.1)
|
|
yakkety |
Not vulnerable
|
|
zesty |
Not vulnerable
|
|
Patches: upstream: https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=828358d22c6bcf0a1ade5b3ffaa8018a385bfc6c |
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6247
- https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=828358d22c6bcf0a1ade5b3ffaa8018a385bfc6c
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11358
- http://www.wireshark.org/security/wnpa-sec-2015-27.html
- NVD
- Launchpad
- Debian