The (1) dissect_tfs_request and (2) dissect_tfs_response functions in epan/dissectors/packet-ieee80211.c in the IEEE 802.11 dissector in Wireshark 1.10.x before 1.10.14 and 1.12.x before 1.12.5 interpret a zero value as a length rather than an error condition, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
References
Link | Resource |
---|---|
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11110 | Issue Tracking Vendor Advisory |
https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=e243b0041328980a9bbd43bb8a8166d7422f9096 | Patch Vendor Advisory |
http://www.wireshark.org/security/wnpa-sec-2015-17.html | Vendor Advisory |
http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html | Third Party Advisory |
http://www.securityfocus.com/bid/74631 | |
http://www.debian.org/security/2015/dsa-3277 | |
https://security.gentoo.org/glsa/201510-03 |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Information
Published : 2015-05-26 08:59
Updated : 2017-06-30 18:29
NVD link : CVE-2015-3814
Mitre link : CVE-2015-3814
JSON object : View
CWE
CWE-189
Numeric Errors
Products Affected
wireshark
- wireshark
oracle
- solaris