SB2016080703 - Input validation error in Wireshark
Published: August 7, 2016 Updated: July 28, 2020
Security Bulletin ID
SB2016080703
Severity
Medium
Patch available
YES
Number of vulnerabilities
1
Exploitation vector
Remote access
Highest impact
Denial of service
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Input validation error (CVE-ID: CVE-2016-6512)
The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.
epan/dissectors/packet-wap.c in Wireshark 2.x before 2.0.5 omits an overflow check in the tvb_get_guintvar function, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet, related to the MMSE, WAP, WBXML, and WSP dissectors.
Remediation
Install update from vendor's website.
References
- http://openwall.com/lists/oss-security/2016/07/28/3
- http://www.securityfocus.com/bid/92174
- http://www.securitytracker.com/id/1036480
- http://www.wireshark.org/security/wnpa-sec-2016-48.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12661
- https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=2193bea3212d74e2a907152055e27d409b59485e
- https://www.exploit-db.com/exploits/40195/