Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Vulnerabilities » CVE-2015-0564

Overview

Vulnerability Score 5.0 5.0
CVE Id CVE-2015-0564
Last Modified 23 Mar 2015 10:02:12
Published 09 Jan 2015 09:59:42
Confidentiality Impact NONE NONE
Integrity Impact NONE NONE
Availability Impact PARTIAL PARTIAL
Access Vector NETWORK
Access Complexity LOW
Authentication NONE

CVE-2015-0564

Summary

Buffer underflow in the ssl_decrypt_record function in epan/dissectors/packet-ssl-utils.c in Wireshark 1.10.x before 1.10.12 and 1.12.x before 1.12.3 allows remote attackers to cause a denial of service (application crash) via a crafted packet that is improperly handled during decryption of an SSL session.

Vulnerable Systems

Application

  • Wireshark 1.10.0

  • Wireshark 1.10.1

  • Wireshark 1.10.10

  • Wireshark 1.10.11

  • Wireshark 1.10.2

  • Wireshark 1.10.3

  • Wireshark 1.10.4

  • Wireshark 1.10.5

  • Wireshark 1.10.6

  • Wireshark 1.10.7

  • Wireshark 1.10.8

  • Wireshark 1.10.9

  • Wireshark 1.12.0

  • Wireshark 1.12.1

  • Wireshark 1.12.2


References

CONFIRM - https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=d3581aecda62d2a51ea7088fd46975415b03ec57

CONFIRM - http://www.wireshark.org/security/wnpa-sec-2015-05.html

DEBIAN - DSA-3141

SECUNIA - 62673

SECUNIA - 62612

SUSE - openSUSE-SU-2015:0113

MANDRIVA - MDVSA-2015:022

CONFIRM - http://advisories.mageia.org/MGASA-2015-0019.html

Related Patches

Novell SUSE 2015:10279 wireshark security update for SLE 11 SP3 x86_64

Novell SUSE 2015:10279 wireshark security update for SLE 11 SP3 i586


Last Updated: 27 May 2016 11:08:09