CVE-2016-2529Improper Restriction of Operations within the Bounds of a Memory Buffer in Wireshark

Severity
5.5MEDIUMNVD
EPSS
0.2%
top 61.93%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedFeb 28
Latest updateMay 17

Description

The iseries_check_file_type function in wiretap/iseries.c in the iSeries file parser in Wireshark 2.0.x before 2.0.2 does not consider that a line may lack the "OBJECT PROTOCOL" substring, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted file.

CVSS vector

CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages3 packages

debiandebian/wireshark< wireshark 2.0.2+ga16e22e-1 (bookworm)
Debianwireshark/wireshark< 2.0.2+ga16e22e-1+3
NVDwireshark/wireshark2.0.0, 2.0.1+1

🔴Vulnerability Details

2
GHSA
GHSA-pwvw-mxpg-9856: The iseries_check_file_type function in wiretap/iseries2022-05-17
OSV
CVE-2016-2529: The iseries_check_file_type function in wiretap/iseries2016-02-28

📋Vendor Advisories

2
Red Hat
wireshark: iSeries file parser crash (wnpa-sec-2016-09)2016-02-26
Debian
CVE-2016-2529: wireshark - The iseries_check_file_type function in wiretap/iseries.c in the iSeries file pa...2016

💬Community

2
Bugzilla
CVE-2016-3107 pulp: Node certificate containing private key stored in world-readable file2016-04-11
Bugzilla
CVE-2016-2529 wireshark: iSeries file parser crash (wnpa-sec-2016-09)2016-02-29