Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2016-6512Improper Input Validation in Wireshark

Severity
5.9MEDIUMNVD
OSV7.5
EPSS
1.9%
top 16.76%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedAug 6
Latest updateMay 17

Description

epan/dissectors/packet-wap.c in Wireshark 2.x before 2.0.5 omits an overflow check in the tvb_get_guintvar function, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet, related to the MMSE, WAP, WBXML, and WSP dissectors.

CVSS vector

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 2.2 | Impact: 3.6

Affected Packages4 packages

debiandebian/wireshark< wireshark 2.0.5+ga3be9c6-1 (bookworm)
Debianwireshark/wireshark< 2.0.5+ga3be9c6-1+3
NVDwireshark/wireshark5 versions+4
Ubuntuperl/perl< 5.18.2-2ubuntu1.4+1

🔴Vulnerability Details

3
GHSA
GHSA-jjwq-pq85-jmhq: epan/dissectors/packet-wap2022-05-17
OSV
perl vulnerabilities2018-04-16
OSV
CVE-2016-6512: epan/dissectors/packet-wap2016-08-06

💥Exploits & PoCs

1
Exploit-DB
Wireshark 2.0.0 < 2.0.4 - MMSE / WAP / WBXML / WSP Dissectors Denial of Service2016-08-03

📋Vendor Advisories

2
Red Hat
wireshark: MMSE, WAP, WBXML, and WSP infinite loop. (wnpa-sec-2016-48)2016-07-27
Debian
CVE-2016-6512: wireshark - epan/dissectors/packet-wap.c in Wireshark 2.x before 2.0.5 omits an overflow che...2016

💬Community

1
Bugzilla
CVE-2016-6512 wireshark: MMSE, WAP, WBXML, and WSP infinite loop. (wnpa-sec-2016-48)2016-07-28