Wireshark 'epan/packet. c' Remote Denial of Service Vulnerability (CVE-2015-6243)
Wireshark 'epan/packet. c' Remote Denial of Service Vulnerability (CVE-2015-6243)
Release date:
Updated on:
Affected Systems:
Wireshark Wireshark 1.12.x
Description:
Bugtraq id: 76384
CVE (CAN) ID: CVE-2015-6243
Wireshark is the most popular network protocol parser.
Wireshark versions earlier than 1.12.7, 'epan/packet. c ''s dissector-table implementation does not properly process empty string searches in the table, which allows remote attackers to exploit this vulnerability to cause DoS (application crash) by constructing data packets ).
<* Source: vendor
*>
Suggestion:
Vendor patch:
Wireshark
---------
The vendor has released a patch to fix this security problem. Please download it from the vendor's homepage:
Https://code.wireshark.org/review/gitweb? P = wireshark. git; a = commit; h = eb1ccbdccde89701f255f921d88992878057477d
Https://bugs.wireshark.org/bugzilla/show_bug.cgi? Id = 11381
Http://www.wireshark.org/security/wnpa-sec-2015-23.html
Install Wireshark in Ubuntu 13.10
Simple use of Wireshark
Install Wireshark in Ubuntu 12.04
Starting Wireshark packet capture from common users in Linux
Install and run Wireshark in Linux
Wireshark details: click here
Wireshark: click here
This article permanently updates the link address: