Vulnerability Details : CVE-2015-7830
The pcapng_read_if_descr_block function in wiretap/pcapng.c in the pcapng parser in Wireshark 1.12.x before 1.12.8 uses too many levels of pointer indirection, which allows remote attackers to cause a denial of service (incorrect free and application crash) via a crafted packet that triggers interface-filter copying.
Vulnerability category: Input validationDenial of service
Products affected by CVE-2015-7830
- cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.12.0:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.12.1:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.12.2:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.12.3:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.12.4:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.12.5:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.12.6:*:*:*:*:*:*:*
- cpe:2.3:a:wireshark:wireshark:1.12.7:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2015-7830
0.43%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 72 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2015-7830
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:N/I:N/A:P |
8.6
|
2.9
|
NIST |
CWE ids for CVE-2015-7830
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: nvd@nist.gov (Primary)
References for CVE-2015-7830
-
http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
Oracle Solaris Third Party Bulletin - October 2015Third Party Advisory
-
http://www.securitytracker.com/id/1033953
Wireshark Bug in pcapng File Parser Lets Remote Users Cause the Target Service to Crash - SecurityTracker
-
http://www.zerodayinitiative.com/advisories/ZDI-15-624
ZDI-15-624 | Zero Day Initiative
-
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11455
11455 – Crash in multiple binariesIssue Tracking;Vendor Advisory
-
http://www.wireshark.org/security/wnpa-sec-2015-30.html
Wireshark · wnpa-sec-2015-30 · Pcapng file parser crashVendor Advisory
-
http://lists.opensuse.org/opensuse-updates/2015-10/msg00053.html
openSUSE-SU-2015:1836-1: moderate: Security update for wireshark
-
https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=72497918b16b706c3ba75e1f731f58b802ca14d1
code.wireshark Code Review - wireshark.git/commitPatch
-
http://www.debian.org/security/2016/dsa-3505
Debian -- Security Information -- DSA-3505-1 wireshark
-
http://www.securityfocus.com/bid/78723
Wireshark PCAPNG File CVE-2015-7830 Remote Code Execution Vulnerability
-
http://www.securityfocus.com/bid/77101
Wireshark '/wiretap/pcapng.c' Remote Denial of Service Vulnerability
Jump to