CVE-2015-8725
04.01.2016, 05:59
The dissect_diameter_base_framed_ipv6_prefix function in epan/dissectors/packet-diameter.c in the DIAMETER dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the IPv6 prefix length, which allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) via a crafted packet.Enginsight
Vendor | Product | Version |
---|---|---|
wireshark | wireshark | 1.12.0 |
wireshark | wireshark | 1.12.1 |
wireshark | wireshark | 1.12.2 |
wireshark | wireshark | 1.12.3 |
wireshark | wireshark | 1.12.4 |
wireshark | wireshark | 1.12.5 |
wireshark | wireshark | 1.12.6 |
wireshark | wireshark | 1.12.7 |
wireshark | wireshark | 1.12.8 |
wireshark | wireshark | 2.0.0 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Common Weakness Enumeration
References