Vulnerabilities > CVE-2015-4651 - Resource Management Errors vulnerability in multiple products

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN

Summary

The dissect_wccp2r1_address_table_info function in epan/dissectors/packet-wccp.c in the WCCP dissector in Wireshark 1.12.x before 1.12.6 does not properly determine whether enough memory is available for storing IP address strings, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.

Common Weakness Enumeration (CWE)

Nessus

  • NASL familySuSE Local Security Checks
    NASL idOPENSUSE-2015-478.NASL
    descriptionWireshark was updated to 1.12.6 to fix two security issues. The following vulnerabilities were fixed : - CVE-2015-4651: The WCCP dissector crashed when reading specially crafted packages from the network or a capture files (wnpa-sec-2015-19, boo#935157). - CVE-2015-4652: The GSM DTAP dissector crashed when reading specially crafted packages from the network or a capture file (wnpa-sec-2015-20, boo#935158). This update also contains further bug fixes and updated protocol support as listed in: https://www.wireshark.org/docs/relnotes/wireshark-1.12.6.html
    last seen2020-06-05
    modified2015-07-13
    plugin id84657
    published2015-07-13
    reporterThis script is Copyright (C) 2015-2020 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/84657
    titleopenSUSE Security Update : wireshark (openSUSE-2015-478)
  • NASL familyGentoo Local Security Checks
    NASL idGENTOO_GLSA-201510-03.NASL
    descriptionThe remote host is affected by the vulnerability described in GLSA-201510-03 (Wireshark: Multiple vulnerabilities) Multiple vulnerabilities have been discovered in Wireshark. Please review the CVE identifiers referenced below for details. Impact : A remote attacker could possibly cause a Denial of Service condition. Workaround : There is no known workaround at this time.
    last seen2020-06-01
    modified2020-06-02
    plugin id86688
    published2015-11-02
    reporterThis script is Copyright (C) 2015-2016 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/86688
    titleGLSA-201510-03 : Wireshark: Multiple vulnerabilities
  • NASL familyWindows
    NASL idWIRESHARK_1_12_6.NASL
    descriptionThe version of Wireshark installed on the remote Windows host is 1.12.x prior to 1.12.6. It is, therefore, affected by multiple denial of service vulnerabilities : - An unspecified flaw exists in the WCCP dissector. A remote attacker can exploit this flaw, by injecting a specially crafted packet or by convincing a user to open a malformed PCAP file, to crash the application. (CVE-2015-4651) - An unspecified flaw exists in the GSM DTAP dissector. A remote attacker can exploit this flaw, by injecting a specially crafted packet or by convincing a user to open a malformed PCAP file, to crash the application. (CVE-2015-4652) Note that Nessus has not tested for these issues but has instead relied only on the application
    last seen2020-06-01
    modified2020-06-02
    plugin id84398
    published2015-06-25
    reporterThis script is Copyright (C) 2015-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/84398
    titleWireshark 1.12.x < 1.12.6 Multiple DoS Vulnerabilities
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-3294.NASL
    descriptionMultiple vulnerabilities were discovered in the dissectors for WCCP and GSM DTAP, which could result in denial of service. The oldstable distribution (wheezy) is not affected.
    last seen2020-06-01
    modified2020-06-02
    plugin id84350
    published2015-06-24
    reporterThis script is Copyright (C) 2015-2018 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/84350
    titleDebian DSA-3294-1 : wireshark - security update