CVE-2016-4006Improper Restriction of Operations within the Bounds of a Memory Buffer in Wireshark

Severity
5.9MEDIUMNVD
EPSS
0.2%
top 58.34%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedApr 25
Latest updateMay 17

Description

epan/proto.c in Wireshark 1.12.x before 1.12.11 and 2.0.x before 2.0.3 does not limit the protocol-tree depth, which allows remote attackers to cause a denial of service (stack memory consumption and application crash) via a crafted packet.

CVSS vector

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 2.2 | Impact: 3.6

Affected Packages3 packages

debiandebian/wireshark< wireshark 2.0.3+geed34f0-1 (bookworm)
Debianwireshark/wireshark< 2.0.3+geed34f0-1+3
NVDwireshark/wireshark14 versions+13

🔴Vulnerability Details

2
GHSA
GHSA-c9v6-pvjj-3wqc: epan/proto2022-05-17
OSV
CVE-2016-4006: epan/proto2016-04-25

📋Vendor Advisories

2
Red Hat
wireshark: Wireshark and TShark crash (wnpa-sec-2016-25)2016-04-22
Debian
CVE-2016-4006: wireshark - epan/proto.c in Wireshark 1.12.x before 1.12.11 and 2.0.x before 2.0.3 does not ...2016

💬Community

2
Bugzilla
CVE-2016-4006 wireshark: Wireshark and TShark crash (wnpa-sec-2016-25)2016-04-25
Bugzilla
CVE-2016-4006 CVE-2016-4078 CVE-2016-4079 CVE-2016-4080 CVE-2016-4081 CVE-2016-4082 CVE-2016-4085 wireshark: various flaws [fedora-all]2016-04-25