CVE Vulnerabilities

CVE-2016-9376

Published: Nov 17, 2016 | Modified: Apr 12, 2025
CVSS 3.x
5.9
MEDIUM
Source:
NVD
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
4.3 MEDIUM
AV:N/AC:M/Au:N/C:N/I:N/A:P
RedHat/V2
4.3 MODERATE
AV:N/AC:M/Au:N/C:N/I:N/A:P
RedHat/V3
5.9 MODERATE
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

In Wireshark 2.2.0 to 2.2.1 and 2.0.0 to 2.0.7, the OpenFlow dissector could crash with memory exhaustion, triggered by network traffic or a capture file. This was addressed in epan/dissectors/packet-openflow_v5.c by ensuring that certain length values were sufficiently large.

Affected Software

NameVendorStart VersionEnd Version
WiresharkWireshark2.0.0 (including)2.0.0 (including)
WiresharkWireshark2.0.1 (including)2.0.1 (including)
WiresharkWireshark2.0.2 (including)2.0.2 (including)
WiresharkWireshark2.0.3 (including)2.0.3 (including)
WiresharkWireshark2.0.4 (including)2.0.4 (including)
WiresharkWireshark2.0.5 (including)2.0.5 (including)
WiresharkWireshark2.0.6 (including)2.0.6 (including)
WiresharkWireshark2.0.7 (including)2.0.7 (including)
WiresharkWireshark2.2.0 (including)2.2.0 (including)
WiresharkWireshark2.2.1 (including)2.2.1 (including)
WiresharkUbuntuesm-apps/xenial*
WiresharkUbuntuesm-infra-legacy/trusty*
WiresharkUbuntuprecise*
WiresharkUbuntutrusty*
WiresharkUbuntutrusty/esm*
WiresharkUbuntuupstream*
WiresharkUbuntuxenial*
WiresharkUbuntuyakkety*
WiresharkUbuntuzesty*

References