CVE-2015-6248Improper Input Validation in Wireshark

Severity
4.3MEDIUMNVD
EPSS
0.7%
top 28.40%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedAug 24
Latest updateMay 13

Description

The ptvcursor_add function in the ptvcursor implementation in epan/proto.c in Wireshark 1.12.x before 1.12.7 does not check whether the expected amount of data is available, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.

CVSS vector

AV:N/AC:M/C:N/I:N/A:PExploitability: 8.6 | Impact: 2.9

Affected Packages4 packages

Debianwireshark/wireshark< 1.12.7+g7fc8978-1+3
NVDwireshark/wireshark7 versions+6
NVDoracle/solaris11.3

🔴Vulnerability Details

3
GHSA
GHSA-3p72-rmv7-7jc9: The ptvcursor_add function in the ptvcursor implementation in epan/proto2022-05-13
CVEList
CVE-2015-6248: The ptvcursor_add function in the ptvcursor implementation in epan/proto2015-08-24
OSV
CVE-2015-6248: The ptvcursor_add function in the ptvcursor implementation in epan/proto2015-08-24

📋Vendor Advisories

2
Red Hat
wireshark: Ptvcursor crash (wnpa-sec-2015-28)2015-08-11
Debian
CVE-2015-6248: wireshark - The ptvcursor_add function in the ptvcursor implementation in epan/proto.c in Wi...2015

💬Community

1
Bugzilla
CVE-2015-6248 wireshark: Ptvcursor crash (wnpa-sec-2015-28)2015-08-13
CVE-2015-6248 — Improper Input Validation in Wireshark | cvebase