CVE-2015-8738Improper Input Validation in Wireshark

Severity
5.5MEDIUMNVD
EPSS
0.1%
top 74.14%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJan 4
Latest updateMay 17

Description

The s7comm_decode_ud_cpu_szl_subfunc function in epan/dissectors/packet-s7comm_szl_ids.c in the S7COMM dissector in Wireshark 2.0.x before 2.0.1 does not validate the list count in an SZL response, which allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted packet.

CVSS vector

CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages3 packages

debiandebian/wireshark< wireshark 2.0.1+g59ea380-1 (bookworm)
Debianwireshark/wireshark< 2.0.1+g59ea380-1+3

🔴Vulnerability Details

2
GHSA
GHSA-7pv3-cg97-63h8: The s7comm_decode_ud_cpu_szl_subfunc function in epan/dissectors/packet-s7comm_szl_ids2022-05-17
OSV
CVE-2015-8738: The s7comm_decode_ud_cpu_szl_subfunc function in epan/dissectors/packet-s7comm_szl_ids2016-01-04

📋Vendor Advisories

2
Red Hat
wireshark: S7COMM dissector crash (wnpa-sec-2015-56)2015-12-29
Debian
CVE-2015-8738: wireshark - The s7comm_decode_ud_cpu_szl_subfunc function in epan/dissectors/packet-s7comm_s...2015

💬Community

1
Bugzilla
CVE-2015-8738 wireshark: S7COMM dissector crash (wnpa-sec-2015-56)2016-01-06