Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2015-8733Improper Input Validation in Wireshark

Severity
5.5MEDIUMNVD
EPSS
1.6%
top 18.10%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedJan 4
Latest updateMay 17

Description

The ngsniffer_process_record function in wiretap/ngsniffer.c in the Sniffer file parser in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the relationships between record lengths and record header lengths, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted file.

CVSS vector

CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages3 packages

debiandebian/wireshark< wireshark 2.0.1+g59ea380-1 (bookworm)
Debianwireshark/wireshark< 2.0.1+g59ea380-1+3
NVDwireshark/wireshark10 versions+9

🔴Vulnerability Details

2
GHSA
GHSA-9p72-89p6-6vxm: The ngsniffer_process_record function in wiretap/ngsniffer2022-05-17
OSV
CVE-2015-8733: The ngsniffer_process_record function in wiretap/ngsniffer2016-01-04

💥Exploits & PoCs

1
Exploit-DB
Wireshark - 'infer_pkt_encap' Heap Out-of-Bounds Read2015-12-22

📋Vendor Advisories

2
Red Hat
wireshark: Sniffer file parser crash (wnpa-sec-2015-51)2015-12-29
Debian
CVE-2015-8733: wireshark - The ngsniffer_process_record function in wiretap/ngsniffer.c in the Sniffer file...2015

💬Community

1
Bugzilla
CVE-2015-8733 wireshark: Sniffer file parser crash (wnpa-sec-2015-51)2016-01-06