CVE-2015-8725

Published: 04 January 2016

The dissect_diameter_base_framed_ipv6_prefix function in epan/dissectors/packet-diameter.c in the DIAMETER dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the IPv6 prefix length, which allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) via a crafted packet.

Priority

Medium

CVSS 3 base score: 5.5

Status

Package Release Status
wireshark
Launchpad, Ubuntu, Debian
Upstream Needs triage

Ubuntu 18.04 LTS (Bionic Beaver)
Released (2.6.3-1~ubuntu18.04.1)
Ubuntu 16.04 LTS (Xenial Xerus)
Released (2.6.3-1~ubuntu16.04.1)
Ubuntu 14.04 ESM (Trusty Tahr)
Released (2.6.3-1~ubuntu14.04.1)