CVE-2015-6248
Publication date 24 August 2015
Last updated 24 July 2024
Ubuntu priority
The ptvcursor_add function in the ptvcursor implementation in epan/proto.c in Wireshark 1.12.x before 1.12.7 does not check whether the expected amount of data is available, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
Status
Package | Ubuntu Release | Status |
---|---|---|
wireshark | 18.04 LTS bionic |
Fixed 2.6.3-1~ubuntu18.04.1
|
16.04 LTS xenial |
Fixed 2.6.3-1~ubuntu16.04.1
|
|
14.04 LTS trusty |
Fixed 2.6.3-1~ubuntu14.04.1
|
|
Patch details
Package | Patch details |
---|---|
wireshark |
References
Other references
- https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=5b53445e815fd6b652d49df03ec3d60b088c4fbc
- https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=3fc4a831e035604b0af14ed8a5c9f6596a3448d0
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11358
- http://www.wireshark.org/security/wnpa-sec-2015-28.html
- https://www.cve.org/CVERecord?id=CVE-2015-6248