The dissect_wccp2r1_address_table_info function in epan/dissectors/packet-wccp.c in the WCCP dissector in Wireshark 1.12.x before 1.12.6 does not properly determine whether enough memory is available for storing IP address strings, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Wireshark | Wireshark | 1.12.0 (including) | 1.12.0 (including) |
Wireshark | Wireshark | 1.12.1 (including) | 1.12.1 (including) |
Wireshark | Wireshark | 1.12.2 (including) | 1.12.2 (including) |
Wireshark | Wireshark | 1.12.3 (including) | 1.12.3 (including) |
Wireshark | Wireshark | 1.12.4 (including) | 1.12.4 (including) |
Wireshark | Wireshark | 1.12.5 (including) | 1.12.5 (including) |
Wireshark | Ubuntu | bionic | * |
Wireshark | Ubuntu | precise | * |
Wireshark | Ubuntu | trusty | * |
Wireshark | Ubuntu | upstream | * |
Wireshark | Ubuntu | utopic | * |
Wireshark | Ubuntu | vivid | * |
Wireshark | Ubuntu | xenial | * |