Description
epan/crypt/airpdcap.c in the IEEE 802.11 dissector in Wireshark 2.x before 2.0.4 mishandles certain length values, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
References (6)
Core 6
Core References
Patch x_refsource_confirm
https://github.com/wireshark/wireshark/commit/b6d838eebf4456192360654092e5587c5207f185
Issue Tracking, VDB Entry x_refsource_confirm
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12175
Mailing List mailing-list
x_refsource_mlist
http://www.openwall.com/lists/oss-security/2016/06/09/3
Vendor Advisory x_refsource_confirm
http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/91140
Vendor Advisory x_refsource_confirm
https://www.wireshark.org/security/wnpa-sec-2016-31.html
Scores
CVSS v3
5.9
EPSS
0.0026
EPSS Percentile
48.8%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
Details
CWE
CWE-125
Status
published
Products (4)
wireshark/wireshark
2.0.0
wireshark/wireshark
2.0.1
wireshark/wireshark
2.0.2
wireshark/wireshark
2.0.3
Published
Aug 07, 2016
Tracked Since
Feb 18, 2026