Wireshark up to 1.12.6 ZigBee Dissector packet-zbee-security.c dissect_zbee_secure input validation
| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 5.1 | $0-$5k | 0.00 |
Summary
A vulnerability, which was classified as problematic, has been found in Wireshark up to 1.12.6. This vulnerability affects the function dissect_zbee_secure of the file epan/dissectors/packet-zbee-security.c of the component ZigBee Dissector. Performing a manipulation results in input validation.
This vulnerability is identified as CVE-2015-6244. There is not any exploit available.
It is advisable to upgrade the affected component.
Details
A vulnerability, which was classified as problematic, was found in Wireshark up to 1.12.6 (Packet Analyzer Software). This affects the function dissect_zbee_secure of the file epan/dissectors/packet-zbee-security.c of the component ZigBee Dissector. The manipulation with an unknown input leads to a input validation vulnerability. CWE is classifying the issue as CWE-20. The product receives input or data, but it does
not validate or incorrectly validates that the input has the
properties that are required to process the data safely and
correctly. This is going to have an impact on availability. The summary by CVE is:
The dissect_zbee_secure function in epan/dissectors/packet-zbee-security.c in the ZigBee dissector in Wireshark 1.12.x before 1.12.7 improperly relies on length fields contained in packet data, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
The weakness was released 08/24/2015 (Website). The advisory is shared at code.wireshark.org. This vulnerability is uniquely identified as CVE-2015-6244 since 08/14/2015. It is possible to initiate the attack remotely. No form of authentication is needed for exploitation. Technical details are known, but no exploit is available.
The vulnerability scanner Nessus provides a plugin with the ID 86156 (Debian DSA-3367-1 : wireshark - security update), which helps to determine the existence of the flaw in a target environment. It is assigned to the family Debian Local Security Checks. The commercial vulnerability scanner Qualys is able to test this issue with plugin 124189 (Solaris 11.3 Support Repository Update (SRU) 1.5.0 Missing).
Upgrading to version 1.12.7 eliminates this vulnerability.
The vulnerability is also documented in the databases at Tenable (86156), SecurityFocus (BID 76383†) and Vulnerability Center (SBV-52313†). Entries connected to this vulnerability are available at VDB-76766, VDB-76767, VDB-77418 and VDB-77419. If you want to get the best quality for vulnerability data then you always have to consider VulDB.
Product
Type
Name
Version
License
Website
- Product: https://www.wireshark.org/
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 5.3VulDB Meta Temp Score: 5.1
VulDB Base Score: 5.3
VulDB Temp Score: 5.1
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Input validationCWE: CWE-20
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Nessus ID: 86156
Nessus Name: Debian DSA-3367-1 : wireshark - security update
Nessus File: 🔍
Nessus Risk: 🔍
Nessus Family: 🔍
OpenVAS ID: 703367
OpenVAS Name: Debian Security Advisory DSA 3367-1 (wireshark - security update)
OpenVAS File: 🔍
OpenVAS Family: 🔍
Qualys ID: 🔍
Qualys Name: 🔍
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔍
Upgrade: Wireshark 1.12.7
Patch: 31571144be5f03f054a9c7e195b38c2f5792fe54
Timeline
08/11/2015 🔍08/11/2015 🔍
08/14/2015 🔍
08/24/2015 🔍
08/24/2015 🔍
08/25/2015 🔍
08/26/2015 🔍
06/13/2022 🔍
Sources
Product: wireshark.orgAdvisory: code.wireshark.org⛔
Status: Not defined
Confirmation: 🔍
CVE: CVE-2015-6244 (🔍)
GCVE (CVE): GCVE-0-2015-6244
GCVE (VulDB): GCVE-100-77421
OVAL: 🔍
SecurityFocus: 76383 - Wireshark ZigBee Dissector Denial of Service Vulnerability
SecurityTracker: 1033272
Vulnerability Center: 52313 - Wireshark 1.12-1.12.6 Remote DoS in ZigBee Dissector, Medium
See also: 🔍
Entry
Created: 08/25/2015 10:05Updated: 06/13/2022 10:47
Changes: 08/25/2015 10:05 (61), 11/05/2017 00:49 (12), 06/13/2022 10:41 (5), 06/13/2022 10:47 (1)
Complete: 🔍
Cache ID: 216:0B6:103
If you want to get the best quality for vulnerability data then you always have to consider VulDB.
No comments yet. Languages: en.
Please log in to comment.