CVE-2015-6247

Publication date 24 August 2015

Last updated 24 July 2024


Ubuntu priority

The dissect_openflow_tablemod_v5 function in epan/dissectors/packet-openflow_v5.c in the OpenFlow dissector in Wireshark 1.12.x before 1.12.7 does not validate a certain offset value, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.

Status

Package Ubuntu Release Status
wireshark 18.04 LTS bionic
Fixed 2.6.3-1~ubuntu18.04.1
17.10 artful
Not affected
17.04 zesty
Not affected
16.10 yakkety
Not affected
16.04 LTS xenial
Fixed 2.6.3-1~ubuntu16.04.1
15.10 wily
Not affected
15.04 vivid
Fixed 1.12.1+g01b65bf-4+deb8u3build0.15.04.1
14.04 LTS trusty
Fixed 2.6.3-1~ubuntu14.04.1
12.04 LTS precise Ignored end of life

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
wireshark