CVE-2015-6247Improper Input Validation in Wireshark

Severity
4.3MEDIUMNVD
EPSS
0.6%
top 31.38%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedAug 24
Latest updateMay 17

Description

The dissect_openflow_tablemod_v5 function in epan/dissectors/packet-openflow_v5.c in the OpenFlow dissector in Wireshark 1.12.x before 1.12.7 does not validate a certain offset value, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.

CVSS vector

AV:N/AC:M/C:N/I:N/A:PExploitability: 8.6 | Impact: 2.9

Affected Packages3 packages

Debianwireshark/wireshark< 1.12.7+g7fc8978-1+3
NVDwireshark/wireshark7 versions+6
NVDoracle/solaris11.3

🔴Vulnerability Details

3
GHSA
GHSA-cpj3-4vwc-2h5c: The dissect_openflow_tablemod_v5 function in epan/dissectors/packet-openflow_v52022-05-17
CVEList
CVE-2015-6247: The dissect_openflow_tablemod_v5 function in epan/dissectors/packet-openflow_v52015-08-24
OSV
CVE-2015-6247: The dissect_openflow_tablemod_v5 function in epan/dissectors/packet-openflow_v52015-08-24

📋Vendor Advisories

2
Red Hat
wireshark: OpenFlow dissector infinite loop (wnpa-sec-2015-27)2015-08-11
Debian
CVE-2015-6247: wireshark - The dissect_openflow_tablemod_v5 function in epan/dissectors/packet-openflow_v5....2015

💬Community

1
Bugzilla
CVE-2015-6247 wireshark: OpenFlow dissector infinite loop (wnpa-sec-2015-27)2015-08-13
CVE-2015-6247 — Improper Input Validation in Wireshark | cvebase