Revision Date: | 2016-04-25 | Version: | 1 | Title: | CVE-2016-4085 on Ubuntu 16.04 LTS (xenial) - medium. | Description: | Stack-based buffer overflow in epan/dissectors/packet-ncp2222.inc in the NCP dissector in Wireshark 1.12.x before 1.12.11 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a long string in a packet.
| Family: | unix | Class: | vulnerability | Status: | | Reference(s): | CVE-2016-4085
| Platform(s): | Ubuntu 16.04 LTS
| Product(s): | | Definition Synopsis | Ubuntu 16.04 LTS (xenial) is installed. AND Package Information
NOT libwireshark-data package in xenial, while related to the CVE in some way, is not affected.
OR NOT libwireshark11 package in xenial, while related to the CVE in some way, is not affected.
OR NOT libwiretap8 package in xenial, while related to the CVE in some way, is not affected.
OR NOT libwscodecs2 package in xenial, while related to the CVE in some way, is not affected.
OR NOT libwsutil9 package in xenial, while related to the CVE in some way, is not affected.
OR NOT tshark package in xenial, while related to the CVE in some way, is not affected.
OR NOT wireshark package in xenial, while related to the CVE in some way, is not affected.
OR NOT wireshark-common package in xenial, while related to the CVE in some way, is not affected.
OR NOT wireshark-gtk package in xenial, while related to the CVE in some way, is not affected.
OR NOT wireshark-qt package in xenial, while related to the CVE in some way, is not affected.
|
|