| Vulnerability Name: | CVE-2016-4076 (CCN-112630) | ||||||||||||||||||||||||||||||||
| Assigned: | 2016-04-22 | ||||||||||||||||||||||||||||||||
| Published: | 2016-04-22 | ||||||||||||||||||||||||||||||||
| Updated: | 2016-12-03 | ||||||||||||||||||||||||||||||||
| Summary: | epan/dissectors/packet-ncp2222.inc in the NCP dissector in Wireshark 2.0.x before 2.0.3 does not properly initialize memory for search patterns, which allows remote attackers to cause a denial of service (application crash) via a crafted packet. | ||||||||||||||||||||||||||||||||
| CVSS v3 Severity: | 5.9 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H) 5.2 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
4.6 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||
| CVSS v2 Severity: | 4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P)
| ||||||||||||||||||||||||||||||||
| Vulnerability Type: | CWE-284 | ||||||||||||||||||||||||||||||||
| Vulnerability Consequences: | Denial of Service | ||||||||||||||||||||||||||||||||
| References: | Source: MITRE Type: CNA CVE-2016-4076 Source: SECTRACK Type: UNKNOWN 1035685 Source: CONFIRM Type: Vendor Advisory http://www.wireshark.org/security/wnpa-sec-2016-19.html Source: CONFIRM Type: UNKNOWN https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11591 Source: CONFIRM Type: UNKNOWN https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=ea8e6955fcff21333c203bc00f69d5025761459b Source: XF Type: UNKNOWN wireshark-cve20164076-dos(112630) Source: CCN Type: WhiteSource Vulnerability Database CVE-2016-4076 Source: CCN Type: Wireshark advisory wnpa-sec-2016-19 NCP dissector crash | ||||||||||||||||||||||||||||||||
| Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||||||||||||||||||||||
| Oval Definitions | |||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||
| BACK | |||||||||||||||||||||||||||||||||