CVE-2015-0563Improper Input Validation in Wireshark

Severity
5.0MEDIUMNVD
EPSS
1.0%
top 22.48%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 10
Latest updateMay 14

Description

epan/dissectors/packet-smtp.c in the SMTP dissector in Wireshark 1.10.x before 1.10.12 and 1.12.x before 1.12.3 uses an incorrect length value for certain string-append operations, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.

CVSS vector

AV:N/AC:L/C:N/I:N/A:PExploitability: 10.0 | Impact: 2.9

Affected Packages4 packages

debiandebian/wireshark< wireshark 1.12.1+g01b65bf-3 (bookworm)
Debianwireshark/wireshark< 1.12.1+g01b65bf-3+3
NVDwireshark/wireshark15 versions+14
NVDopensuse/opensuse13.1, 13.2+1

🔴Vulnerability Details

2
GHSA
GHSA-x3q8-3jrc-q6hp: epan/dissectors/packet-smtp2022-05-14
OSV
CVE-2015-0563: epan/dissectors/packet-smtp2015-01-10

📋Vendor Advisories

2
Red Hat
wireshark: SMTP dissector crash (wnpa-sec-2015-04)2015-01-07
Debian
CVE-2015-0563: wireshark - epan/dissectors/packet-smtp.c in the SMTP dissector in Wireshark 1.10.x before 1...2015

💬Community

2
Bugzilla
CVE-2015-0563 wireshark: SMTP dissector crash (wnpa-sec-2015-04) [fedora-all]2015-01-08
Bugzilla
CVE-2015-0563 wireshark: SMTP dissector crash (wnpa-sec-2015-04)2015-01-08