CVE-2015-3813Missing Release of Memory after Effective Lifetime in Wireshark

Severity
5.0MEDIUMNVD
EPSS
0.3%
top 42.58%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMay 26
Latest updateMay 14

Description

The fragment_add_work function in epan/reassemble.c in the packet-reassembly feature in Wireshark 1.12.x before 1.12.5 does not properly determine the defragmentation state in a case of an insufficient snapshot length, which allows remote attackers to cause a denial of service (memory consumption) via a crafted packet.

CVSS vector

AV:N/AC:L/C:N/I:N/A:PExploitability: 10.0 | Impact: 2.9

Affected Packages3 packages

debiandebian/wireshark< wireshark 1.12.5+g5819e5b-1 (bookworm)
Debianwireshark/wireshark< 1.12.5+g5819e5b-1+3
NVDwireshark/wireshark5 versions+4

🔴Vulnerability Details

2
GHSA
GHSA-8763-cjp2-7qf4: The fragment_add_work function in epan/reassemble2022-05-14
OSV
CVE-2015-3813: The fragment_add_work function in epan/reassemble2015-05-26

📋Vendor Advisories

2
Red Hat
wireshark: Reassembly memory leak (wnpa-sec-2015-16)2015-05-12
Debian
CVE-2015-3813: wireshark - The fragment_add_work function in epan/reassemble.c in the packet-reassembly fea...2015

💬Community

1
Bugzilla
CVE-2015-3813 wireshark: Reassembly memory leak (wnpa-sec-2015-16)2015-05-18