CVE-2016-2525Improper Input Validation in Wireshark

Severity
5.9MEDIUMNVD
EPSS
0.3%
top 47.23%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedFeb 28
Latest updateMay 17

Description

epan/dissectors/packet-http2.c in the HTTP/2 dissector in Wireshark 2.0.x before 2.0.2 does not limit the amount of header data, which allows remote attackers to cause a denial of service (memory consumption or application crash) via a crafted packet.

CVSS vector

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 2.2 | Impact: 3.6

Affected Packages3 packages

debiandebian/wireshark< wireshark 2.0.2+ga16e22e-1 (bookworm)
Debianwireshark/wireshark< 2.0.2+ga16e22e-1+3
NVDwireshark/wireshark2.0.0, 2.0.1+1

🔴Vulnerability Details

2
GHSA
GHSA-mvhm-3q9r-jvrj: epan/dissectors/packet-http22022-05-17
OSV
CVE-2016-2525: epan/dissectors/packet-http22016-02-28

📋Vendor Advisories

2
Red Hat
wireshark: HTTP/2 dissector crash (wnpa-sec-2016-05)2016-02-26
Debian
CVE-2016-2525: wireshark - epan/dissectors/packet-http2.c in the HTTP/2 dissector in Wireshark 2.0.x before...2016

💬Community

1
Bugzilla
CVE-2016-2525 wireshark: HTTP/2 dissector crash (wnpa-sec-2016-05)2016-02-29