CVE-2016-4083Improper Input Validation in Wireshark

Severity
5.9MEDIUMNVD
EPSS
0.2%
top 55.85%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedApr 25
Latest updateMay 17

Description

epan/dissectors/packet-mswsp.c in the MS-WSP dissector in Wireshark 2.0.x before 2.0.3 does not ensure that data is available before array allocation, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.

CVSS vector

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 2.2 | Impact: 3.6

Affected Packages3 packages

debiandebian/wireshark< wireshark 2.0.3+geed34f0-1 (bookworm)
Debianwireshark/wireshark< 2.0.3+geed34f0-1+3
NVDwireshark/wireshark2.0.0, 2.0.1, 2.0.2+2

🔴Vulnerability Details

2
GHSA
GHSA-whpg-gq5g-f5h9: epan/dissectors/packet-mswsp2022-05-17
OSV
CVE-2016-4083: epan/dissectors/packet-mswsp2016-04-25

📋Vendor Advisories

2
Red Hat
wireshark: MS-WSP dissector crash (wnpa-sec-2016-27)2016-04-22
Debian
CVE-2016-4083: wireshark - epan/dissectors/packet-mswsp.c in the MS-WSP dissector in Wireshark 2.0.x before...2016

💬Community

1
Bugzilla
CVE-2016-4083 CVE-2016-4084 wireshark: MS-WSP dissector crash (wnpa-sec-2016-27)2016-04-25