CVE-2015-8735
Wireshark - memcpy 'get_value / dissect_btatt' SIGSEGV
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
The get_value function in epan/dissectors/packet-btatt.c in the Bluetooth Attribute (aka BT ATT) dissector in Wireshark 2.0.x before 2.0.1 uses an incorrect integer data type, which allows remote attackers to cause a denial of service (invalid write operation and application crash) via a crafted packet.
La función get_value en epan/dissectors/packet-btatt.c en el disector Bluetooth Attribute (también conocido como BT ATT) en Wireshark 2.0.x en versiones anteriores a 2.0.1 utiliza un tipo de datos de entero incorrecto, lo que permite a atacantes remotos causar una denegación de servicio (operación de escritura no válida y caída de aplicación) a través de un paquete manipulado.
Multiple vulnerabilities have been found in Wireshark, allowing local attackers to escalate privileges and remote attackers to cause Denial of Service. Versions less than 2.0.2 are affected.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2015-12-16 First Exploit
- 2016-01-03 CVE Reserved
- 2016-01-04 CVE Published
- 2024-08-06 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-20: Improper Input Validation
CAPEC
References (7)
URL | Tag | Source |
---|---|---|
http://www.securityfocus.com/bid/79382 | Vdb Entry | |
http://www.securitytracker.com/id/1034551 | Vdb Entry | |
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11817 | X_refsource_confirm | |
https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=83bad0215dae54e77d34f8b187900125f672366e | X_refsource_confirm |
URL | Date | SRC |
---|---|---|
https://www.exploit-db.com/exploits/38998 | 2015-12-16 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://www.wireshark.org/security/wnpa-sec-2015-53.html | 2023-11-07 | |
https://security.gentoo.org/glsa/201604-05 | 2023-11-07 |