CVE-2016-7178

Loading...

General

Score:4.3/10.0
Severity:Low
Category:Buffer Error

Impact Metrics

Confidentiality:None
Integrity:None
Availability:Partial

Exploitability Metrics

Access Vector:Network
Access Complexity:Medium
Authentication:None

Relative vulnerabilities

CVE-2016-6354, CVE-2016-7175, CVE-2016-7176, CVE-2016-7177, CVE-2016-7179, CVE-2016-7180, CVE-2016-9373, CVE-2016-9374, CVE-2016-9375, CVE-2016-9376, CVE-2017-5596, CVE-2017-5597, CVE-2017-6014, CVE-2017-7700, CVE-2017-7701, CVE-2017-7702, CVE-2017-7703, CVE-2017-7704, CVE-2017-7705, CVE-2017-7745, CVE-2017-7746, CVE-2017-7747, CVE-2017-7748

Published on 09/09/16 - Updated on 29/09/16

Description

epan/dissectors/packet-umts_fp.c in the UMTS FP dissector in Wireshark 2.x before 2.0.6 does not ensure that memory is allocated for certain data structures, which allows remote attackers to cause a denial of service (invalid write access and application crash) via a crafted packet.

Category: Buffer Error

CWE-787 (Out-of-bounds Write)
The software writes data past the end, or before the beginning, of the intended buffer.

Security Notices

US National Vulnerability DatabaseCVE-2016-7178
Arch Linux ASA-201609-27
Debian DSA-3671-1
Debian LTSDLA-632-1
SUSE SUSE-SU-2017:1174, SUSE-SU-2017:1442

Exploits

No exploits available for this CVE in our database.

Relative technologies

VendorProduct
debiandebian_linux
wiresharkwireshark

Share this vulnerability with:

Twitter Facebook LinkedIn Mail