CVE-2015-8725 PUBLISHED

The dissect_diameter_base_framed_ipv6_prefix function in epan/dissectors/packet-diameter.c in the DIAMETER dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the IPv6 prefix length, which allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) via a crafted packet.

EPSS 0.74% · 72.7th percentile

Risk Scores

EPSS Score
0.74%
72.7th percentile

Affected Products

VendorProductVersions
Ubuntu:16.04:LTSwireshark0, 1.12.7+g7fc8978-1, 1.12.8+g5b6e543-2
Ubuntu:14.04:LTSwireshark1.12.1+g01b65bf-4+deb8u11ubuntu0.14.04.1, 0, 1.10.2-1
Ubuntu:18.04:LTSwireshark0, 2.4.2-1, 2.4.3-1

Timeline

References

Open in Interactive Console →