The fragment_add_work function in epan/reassemble.c in the packet-reassembly feature in Wireshark 1.12.x before 1.12.5 does not properly determine the defragmentation state in a case of an insufficient snapshot length, which allows remote attackers to cause a denial of service (memory consumption) via a crafted packet.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Wireshark | Wireshark | 1.12.0 (including) | 1.12.0 (including) |
Wireshark | Wireshark | 1.12.1 (including) | 1.12.1 (including) |
Wireshark | Wireshark | 1.12.2 (including) | 1.12.2 (including) |
Wireshark | Wireshark | 1.12.3 (including) | 1.12.3 (including) |
Wireshark | Wireshark | 1.12.4 (including) | 1.12.4 (including) |
Red Hat Enterprise Linux 6 | RedHat | wireshark-0:1.8.10-25.el6 | * |
Red Hat Enterprise Linux 7 | RedHat | wireshark-0:1.10.14-7.el7 | * |
Wireshark | Ubuntu | upstream | * |
Wireshark | Ubuntu | utopic | * |
Wireshark | Ubuntu | vivid | * |