Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2015-8724Improper Input Validation in Wireshark

Severity
5.5MEDIUMNVD
EPSS
0.8%
top 26.40%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedJan 4
Latest updateMay 17

Description

The AirPDcapDecryptWPABroadcastKey function in epan/crypt/airpdcap.c in the 802.11 dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not verify the WPA broadcast key length, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet.

CVSS vector

CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages3 packages

debiandebian/wireshark< wireshark 2.0.1+g59ea380-1 (bookworm)
Debianwireshark/wireshark< 2.0.1+g59ea380-1+3
NVDwireshark/wireshark10 versions+9

🔴Vulnerability Details

2
GHSA
GHSA-2wg5-rphj-mv3r: The AirPDcapDecryptWPABroadcastKey function in epan/crypt/airpdcap2022-05-17
OSV
CVE-2015-8724: The AirPDcapDecryptWPABroadcastKey function in epan/crypt/airpdcap2016-01-04

💥Exploits & PoCs

1
Exploit-DB
Wireshark - 'AirPDcapDecryptWPABroadcastKey' Heap Out-of-Bounds Read (1)2015-12-22

📋Vendor Advisories

2
Red Hat
wireshark: 802.11 decryption crash (wnpa-sec-2015-42)2015-12-29
Debian
CVE-2015-8724: wireshark - The AirPDcapDecryptWPABroadcastKey function in epan/crypt/airpdcap.c in the 802....2015

💬Community

1
Bugzilla
CVE-2015-8723 CVE-2015-8724 wireshark: 802.11 decryption crash (wnpa-sec-2015-42)2016-01-06