Division by zero in Wireshark - CVE-2015-8738
Published: January 4, 2016 / Updated: March 24, 2022
Wireshark
Detailed vulnerability description
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to divide-by-zero error within The s7comm_decode_ud_cpu_szl_subfunc function in epan/dissectors/packet-s7comm_szl_ids.c in the S7COMM dissector in Wireshark 2.0.x before 2.0.1 does not validate the list count in an SZL response, which. A remote attacker can perform a denial of service (divide-by-zero error and application crash) via a crafted packet.
How to mitigate CVE-2015-8738
Sources
- http://www.securitytracker.com/id/1034551
- http://www.wireshark.org/security/wnpa-sec-2015-56.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11823
- https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=858c3f0079f987833fb22eba2c361d1a88ba4103
- https://security.gentoo.org/glsa/201604-05