Name | CVE-2015-8723 |
Description | The AirPDcapPacketProcess function in epan/crypt/airpdcap.c in the 802.11 dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the relationship between the total length and the capture length, which allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) via a crafted packet. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DSA-3505-1 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
wireshark (PTS) | bullseye | 3.4.10-0+deb11u1 | fixed |
| bullseye (security) | 3.4.16-0+deb11u1 | fixed |
| bookworm | 4.0.17-0+deb12u1 | fixed |
| bookworm (security) | 4.0.11-1~deb12u1 | fixed |
| sid, trixie | 4.4.2-1 | fixed |
The information below is based on the following data on fixed versions.
Notes
[squeeze] - wireshark <end-of-life> (Not supported in Squeeze LTS)
https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=40b283181c63cb28bc6f58d80315eccca6650da0
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11790
http://www.wireshark.org/security/wnpa-sec-2015-42.html