CVE-2015-3814

Publication date 26 May 2015

Last updated 24 July 2024


Ubuntu priority

The (1) dissect_tfs_request and (2) dissect_tfs_response functions in epan/dissectors/packet-ieee80211.c in the IEEE 802.11 dissector in Wireshark 1.10.x before 1.10.14 and 1.12.x before 1.12.5 interpret a zero value as a length rather than an error condition, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.

Status

Package Ubuntu Release Status
wireshark 18.04 LTS bionic
Fixed 2.6.3-1~ubuntu18.04.1
17.10 artful
Not affected
17.04 zesty
Not affected
16.10 yakkety
Not affected
16.04 LTS xenial
Fixed 2.6.3-1~ubuntu16.04.1
15.10 wily
Not affected
15.04 vivid
Fixed 1.12.1+g01b65bf-4+deb8u1build0.15.04.1
14.10 utopic Ignored end of life
14.04 LTS trusty
Fixed 2.6.3-1~ubuntu14.04.1
12.04 LTS precise Ignored end of life

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
wireshark