1
Candidate: CVE-2015-8723
4
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8723
5
https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=40b283181c63cb28bc6f58d80315eccca6650da0
6
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11790
7
http://www.wireshark.org/security/wnpa-sec-2015-42.html
9
The AirPDcapPacketProcess function in epan/crypt/airpdcap.c in the 802.11
10
dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not
11
validate the relationship between the total length and the capture length,
12
which allows remote attackers to cause a denial of service (stack-based
13
buffer overflow and application crash) via a crafted packet.
22
upstream_wireshark: needs-triage
23
precise_wireshark: ignored (reached end-of-life)
24
precise/esm_wireshark: DNE (precise was needed)
25
trusty_wireshark: released (1.12.1+g01b65bf-4+deb8u11ubuntu0.14.04.1)
26
vivid_wireshark: ignored (reached end-of-life)
27
vivid/stable-phone-overlay_wireshark: DNE
28
vivid/ubuntu-core_wireshark: DNE
29
wily_wireshark: ignored (reached end-of-life)
30
xenial_wireshark: not-affected (2.0.2+ga16e22e-1)
31
yakkety_wireshark: ignored (reached end-of-life)
32
zesty_wireshark: ignored (reached end-of-life)
33
artful_wireshark: not-affected
34
bionic_wireshark: not-affected
35
devel_wireshark: not-affected