CVE-2016-4077Wireshark vulnerability

6 documents6 sources
Severity
5.9MEDIUMNVD
EPSS
0.2%
top 55.77%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedApr 25
Latest updateMay 17

Description

epan/reassemble.c in TShark in Wireshark 2.0.x before 2.0.3 relies on incorrect special-case handling of truncated Tvb data structures, which allows remote attackers to cause a denial of service (use-after-free and application crash) via a crafted packet.

CVSS vector

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 2.2 | Impact: 3.6

Affected Packages3 packages

debiandebian/wireshark< wireshark 2.0.3+geed34f0-1 (bookworm)
Debianwireshark/wireshark< 2.0.3+geed34f0-1+3
NVDwireshark/wireshark2.0.0, 2.0.1, 2.0.2+2

🔴Vulnerability Details

2
GHSA
GHSA-4hqv-646p-m5g8: epan/reassemble2022-05-17
OSV
CVE-2016-4077: epan/reassemble2016-04-25

📋Vendor Advisories

2
Red Hat
wireshark: TShark reassembly crash (wnpa-sec-2016-20)2016-04-22
Debian
CVE-2016-4077: wireshark - epan/reassemble.c in TShark in Wireshark 2.0.x before 2.0.3 relies on incorrect ...2016

💬Community

1
Bugzilla
CVE-2016-4077 wireshark: TShark reassembly crash (wnpa-sec-2016-20)2016-04-25