Vulnerability Details : CVE-2016-7957
In Wireshark 2.2.0, the Bluetooth L2CAP dissector could crash, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-btl2cap.c by avoiding use of a seven-byte memcmp for potentially shorter strings.
Vulnerability category: Input validation
Exploit prediction scoring system (EPSS) score for CVE-2016-7957
Probability of exploitation activity in the next 30 days: 0.32%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 67 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2016-7957
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST |
7.5
|
HIGH | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
3.9
|
3.6
|
NIST |
CWE ids for CVE-2016-7957
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: nvd@nist.gov (Primary)
References for CVE-2016-7957
-
http://www.securityfocus.com/bid/97597
Wireshark 'packet-btl2cap.c' Denial of Service VulnerabilityThird Party Advisory;VDB Entry
-
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12825
12825 – Buildbot crash output: fuzz-2016-09-04-21710.pcapIssue Tracking;Patch
-
https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=355b56b1c6c545072ac0c1225730b526c6749f0a
code.wireshark Code Review - wireshark.git/commitIssue Tracking;Patch;Vendor Advisory
-
https://www.wireshark.org/security/wnpa-sec-2016-56.html
Wireshark · wnpa-sec-2016-56 · Bluetooth L2CAP dissector crashVendor Advisory
Products affected by CVE-2016-7957
- cpe:2.3:a:wireshark:wireshark:2.2.0:*:*:*:*:*:*:*