CVE-2016-6512
moderate-risk
Published 2016-08-06
epan/dissectors/packet-wap.c in Wireshark 2.x before 2.0.5 omits an overflow check in the tvb_get_guintvar function, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet, related to the MMSE, WAP, WBXML, and WSP dissectors.
Do I need to act?
~
1.9% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
!
1 public exploit available
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
5
CVSS 5.9/10
Medium
NETWORK
/ HIGH complexity
Affected Vendors
References (14)
Mailing List
http://openwall.com/lists/oss-security/2016/07/28/3
Vendor Advisory
http://www.wireshark.org/security/wnpa-sec-2016-48.html
Issue Tracking
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12661
Mailing List
http://openwall.com/lists/oss-security/2016/07/28/3
Vendor Advisory
http://www.wireshark.org/security/wnpa-sec-2016-48.html
Issue Tracking
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12661
42
/ 100
moderate-risk
Severity
18/34 · Moderate
Exploitability
12/34 · Low
Exposure
12/34 · Low