CVE-2015-3813
Published: 26 May 2015
The fragment_add_work function in epan/reassemble.c in the packet-reassembly feature in Wireshark 1.12.x before 1.12.5 does not properly determine the defragmentation state in a case of an insufficient snapshot length, which allows remote attackers to cause a denial of service (memory consumption) via a crafted packet.
Priority
Status
Package | Release | Status |
---|---|---|
wireshark Launchpad, Ubuntu, Debian |
precise |
Not vulnerable
|
trusty |
Not vulnerable
(1.10.6-1)
|
|
upstream |
Released
(1.12.5+g5819e5b-1)
|
|
utopic |
Ignored
(end of life)
|
|
vivid |
Released
(1.12.1+g01b65bf-4+deb8u1build0.15.04.1)
|
|
Patches: upstream: https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=c35f2ccb4433718416551cc7a85afb0860529d57 |