Input validation error in Opensuse and Wireshark - CVE-2015-0559
Published: January 10, 2015 / Updated: August 9, 2020
Wireshark.org
Opensuse
Wireshark
Detailed vulnerability description
The vulnerability allows remote attackers to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input. A remote attacker can cause a denial of service (application crash) via a crafted packet, related to the use of packet-scope memory instead of pinfo-scope memory.
How to mitigate CVE-2015-0559
Sources
- http://lists.opensuse.org/opensuse-updates/2015-01/msg00053.html
- http://secunia.com/advisories/62612
- http://www.wireshark.org/security/wnpa-sec-2015-01.html
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=10720
- https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=e843c6797db98bfceab382d5d7e76727e1014f5e