CVE-2015-8736
Wireshark - file_read 'wtap_read_bytes_or_eof/mp2t_find_next_pcr' Stack Buffer Overflow
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
The mp2t_find_next_pcr function in wiretap/mp2t.c in the MP2T file parser in Wireshark 2.0.x before 2.0.1 does not reserve memory for a trailer, which allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) via a crafted file.
La función mp2t_find_next_pcr en wiretap/mp2t.c en el analizador de archivo MP2T en Wireshark 2.0.x en versiones anteriores a 2.0.1 no reserva memoria para un trailer, lo que permite a atacantes remotos causar una denegación de servicio (desbordamiento de buffer basado en pila y caída de aplicación) a través de un archivo manipulado.
Multiple vulnerabilities have been found in Wireshark, allowing local attackers to escalate privileges and remote attackers to cause Denial of Service. Versions less than 2.0.2 are affected.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2015-12-16 First Exploit
- 2016-01-03 CVE Reserved
- 2016-01-04 CVE Published
- 2024-08-06 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-20: Improper Input Validation
CAPEC
References (7)
URL | Tag | Source |
---|---|---|
http://www.securityfocus.com/bid/79382 | Vdb Entry | |
http://www.securitytracker.com/id/1034551 | Vdb Entry | |
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11820 | X_refsource_confirm | |
https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=baa3eab78b422616a92ee38551c1b1510dca4ccb | X_refsource_confirm |
URL | Date | SRC |
---|---|---|
https://www.exploit-db.com/exploits/38997 | 2015-12-16 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://www.wireshark.org/security/wnpa-sec-2015-54.html | 2023-11-07 | |
https://security.gentoo.org/glsa/201604-05 | 2023-11-07 |