|Description||The snoop_read function in wiretap/snoop.c in Wireshark 1.2.x before 1.2.17 and 1.4.x before 1.4.7 does not properly handle certain virtualizable buffers, which allows remote attackers to cause a denial of service (application crash) via a large length value in a snoop file that triggers a stack-based buffer over-read.|
|Source||CVE (at NVD; LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SuSE, Mageia, GitHub code/issues, web search, more)|
|NVD severity||medium (attack range: remote)|
Vulnerable and fixed packages
The table below lists information on source packages.
|wireshark (PTS)||wheezy (security), wheezy||1.8.2-5wheezy18||fixed|
|jessie (security), jessie||1.12.1+g01b65bf-4+deb8u5||fixed|
The information below is based on the following data on fixed versions.
Crashes w/o code injection not treated as security issues, see README.Security