The dissect_btacl function in packet-bthci_acl.c in the Bluetooth ACL dissector in Wireshark 0.99.2 up to and including 1.0.3 allows remote malicious users to cause a denial of service (application crash or abort) via a packet with an invalid length, related to an erroneous tvb_memcpy call.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
wireshark wireshark 0.99.2 |
||
wireshark wireshark 0.99.3 |
||
wireshark wireshark 0.99.4 |
||
wireshark wireshark 1.0.0 |
||
wireshark wireshark 1.0.1 |
||
wireshark wireshark 0.99.6a |
||
wireshark wireshark 0.99.7 |
||
wireshark wireshark 0.99.5 |
||
wireshark wireshark 0.99.6 |
||
wireshark wireshark 1.0.2 |
||
wireshark wireshark 1.0.3 |
||
wireshark wireshark 0.99.8 |
||
wireshark wireshark 1.0 |