Wireshark X.509AF parser DoS Vulnerability (CVE-2016-2524)
Wireshark X.509AF parser DoS Vulnerability (CVE-2016-2524)
Release date:
Updated on:
Affected Systems:
Wireshark Wireshark 2.0.x < 2.0.2
Description:
CVE (CAN) ID: CVE-2016-2524
Wireshark is the most popular network protocol parser.
In some Wireshark versions, epan/dissectors/packet-x509af.c error processes the algorithm ID in the implementation of X.509AF parser. Attackers can exploit this vulnerability to cause DoS (application crash) by constructing packets ).
<* Source: Mateusz Jurczyk
*>
Suggestion:
Vendor patch:
Wireshark
---------
The vendor has released a patch to fix this security problem. Please download it from the vendor's homepage:
Https://code.wireshark.org/review/gitweb? P = wireshark. git; a = commit; h = 4a2cd6c79ecbf2cb21f985f01ce1c1e3030285ec
Http://www.wireshark.org/security/wnpa-sec-2016-11.html
Https://bugs.wireshark.org/bugzilla/show_bug.cgi? Id = 12048
Install Wireshark in Ubuntu 13.10
Use Wireshark to capture data packets from remote Linux
Simple use of Wireshark
Install Wireshark in Ubuntu 12.04
Starting Wireshark packet capture from common users in Linux
Install and run Wireshark in Linux
Wireshark details: click here
Wireshark: click here
This article permanently updates the link address: