1
Candidate: CVE-2015-6247
4
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6247
5
https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=828358d22c6bcf0a1ade5b3ffaa8018a385bfc6c
6
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11358
7
http://www.wireshark.org/security/wnpa-sec-2015-27.html
9
The dissect_openflow_tablemod_v5 function in
10
epan/dissectors/packet-openflow_v5.c in the OpenFlow dissector in Wireshark
11
1.12.x before 1.12.7 does not validate a certain offset value, which allows
12
remote attackers to cause a denial of service (infinite loop) via a crafted
18
Discovered-by: Antti Levomäki
22
upstream: https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=828358d22c6bcf0a1ade5b3ffaa8018a385bfc6c
23
upstream_wireshark: released (1.12.7)
24
precise_wireshark: ignored (reached end-of-life)
25
precise/esm_wireshark: DNE (precise was needed)
26
trusty_wireshark: needed
27
vivid_wireshark: released (1.12.1+g01b65bf-4+deb8u3build0.15.04.1)
28
vivid/stable-phone-overlay_wireshark: DNE
29
vivid/ubuntu-core_wireshark: DNE
30
wily_wireshark: not-affected
31
xenial_wireshark: not-affected
32
yakkety_wireshark: not-affected
33
zesty_wireshark: not-affected
34
artful_wireshark: not-affected
35
bionic_wireshark: not-affected
36
devel_wireshark: not-affected