ID:3896 - Exploit for Stack-based buffer overflow in Wireshark - CVE-2015-8736

 
Main Vulnerability Database Exploits ID:3896 - Exploit for Stack-based buffer overflow in Wireshark - CVE-2015-8736

ID:3896 - Exploit for Stack-based buffer overflow in Wireshark - CVE-2015-8736

Published: August 9, 2020


Vulnerability identifier: #VU40559
Vulnerability risk: Medium
CVE-ID: CVE-2015-8736
CWE-ID: CWE-121
Exploitation vector: Remote access
Vulnerable software:
Wireshark

Link to public exploit:


Vulnerability description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error within the mp2t_find_next_pcr function in wiretap/mp2t.c in the MP2T file parser when processing a crafted file. A remote unauthenticated attacker can trigger stack-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


Remediation

Install update from vendor's website.