CVE Vulnerabilities

CVE-2016-5354

NULL Pointer Dereference

Published: Aug 07, 2016 | Modified: Nov 28, 2016
CVSS 3.x
5.9
MEDIUM
Source:
NVD
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
4.3 MEDIUM
AV:N/AC:M/Au:N/C:N/I:N/A:P
RedHat/V2
4.3 MODERATE
AV:N/AC:M/Au:N/C:N/I:N/A:P
RedHat/V3
Ubuntu
MEDIUM

The USB subsystem in Wireshark 1.12.x before 1.12.12 and 2.x before 2.0.4 mishandles class types, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.

Weakness

A NULL pointer dereference occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit.

Affected Software

Name Vendor Start Version End Version
Wireshark Wireshark 1.12.0 (including) 1.12.0 (including)
Wireshark Wireshark 1.12.1 (including) 1.12.1 (including)
Wireshark Wireshark 1.12.2 (including) 1.12.2 (including)
Wireshark Wireshark 1.12.3 (including) 1.12.3 (including)
Wireshark Wireshark 1.12.4 (including) 1.12.4 (including)
Wireshark Wireshark 1.12.5 (including) 1.12.5 (including)
Wireshark Wireshark 1.12.6 (including) 1.12.6 (including)
Wireshark Wireshark 1.12.7 (including) 1.12.7 (including)
Wireshark Wireshark 1.12.8 (including) 1.12.8 (including)
Wireshark Wireshark 1.12.9 (including) 1.12.9 (including)
Wireshark Wireshark 1.12.10 (including) 1.12.10 (including)
Wireshark Wireshark 1.12.11 (including) 1.12.11 (including)
Wireshark Wireshark 2.0.0 (including) 2.0.0 (including)
Wireshark Wireshark 2.0.1 (including) 2.0.1 (including)
Wireshark Wireshark 2.0.2 (including) 2.0.2 (including)
Wireshark Wireshark 2.0.3 (including) 2.0.3 (including)
Wireshark Ubuntu precise *
Wireshark Ubuntu trusty *
Wireshark Ubuntu upstream *
Wireshark Ubuntu wily *
Wireshark Ubuntu xenial *
Wireshark Ubuntu yakkety *
Wireshark Ubuntu zesty *

Potential Mitigations

References