CVE-2016-4084Wireshark vulnerability

7 documents6 sources
Severity
5.9MEDIUMNVD
EPSS
0.2%
top 62.66%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedApr 25
Latest updateMay 17

Description

Integer signedness error in epan/dissectors/packet-mswsp.c in the MS-WSP dissector in Wireshark 2.0.x before 2.0.3 allows remote attackers to cause a denial of service (integer overflow and application crash) via a crafted packet that triggers an unexpected array size.

CVSS vector

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 2.2 | Impact: 3.6

Affected Packages3 packages

debiandebian/wireshark< wireshark 2.0.3+geed34f0-1 (bookworm)
Debianwireshark/wireshark< 2.0.3+geed34f0-1+3
NVDwireshark/wireshark2.0.0, 2.0.1, 2.0.2+2

🔴Vulnerability Details

2
GHSA
GHSA-6g77-fghh-5x3c: Integer signedness error in epan/dissectors/packet-mswsp2022-05-17
OSV
CVE-2016-4084: Integer signedness error in epan/dissectors/packet-mswsp2016-04-25

📋Vendor Advisories

2
Red Hat
wireshark: MS-WSP dissector crash (wnpa-sec-2016-27)2016-04-22
Debian
CVE-2016-4084: wireshark - Integer signedness error in epan/dissectors/packet-mswsp.c in the MS-WSP dissect...2016

💬Community

1
Bugzilla
CVE-2016-4083 CVE-2016-4084 wireshark: MS-WSP dissector crash (wnpa-sec-2016-27)2016-04-25