Published: 05/12/2012 Updated: 19/09/2017
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

The dissect_isakmp function in epan/dissectors/packet-isakmp.c in the ISAKMP dissector in Wireshark 1.6.x prior to 1.6.12 and 1.8.x prior to 1.8.4 uses an incorrect data structure to determine IKEv2 decryption parameters, which allows remote malicious users to cause a denial of service (application crash) via a malformed packet.

Most Upvoted Vulmon Research Post

There is no Researcher post for this vulnerability
Would you like to share something about it? Sign up now to share your knowledge with the community.
Vulnerable Product Search on Vulmon Subscribe to Product

wireshark wireshark 1.8.2

wireshark wireshark 1.8.3

wireshark wireshark 1.8.0

wireshark wireshark 1.8.1

wireshark wireshark 1.6.2

wireshark wireshark 1.6.3

wireshark wireshark 1.6.4

wireshark wireshark 1.6.5

wireshark wireshark 1.6.10

wireshark wireshark 1.6.11

wireshark wireshark 1.6.8

wireshark wireshark 1.6.0

wireshark wireshark 1.6.7

wireshark wireshark 1.6.1

wireshark wireshark 1.6.6

wireshark wireshark 1.6.9

Vendor Advisories

Synopsis Moderate: wireshark security, bug fix, and enhancement update Type/Severity Security Advisory: Moderate Topic Updated wireshark packages that fix multiple security issues, several bugs,and add various enhancements are now available for Red Hat EnterpriseLinux 6The Red Hat Security Response Team ha ...
Two flaws were found in Wireshark If Wireshark read a malformed packet off a network or opened a malicious dump file, it could crash or, possibly, execute arbitrary code as the user running Wireshark (CVE-2013-3559 , CVE-2013-4083 ) Several denial of service flaws were found in Wireshark Wireshark could crash or stop responding if it read a malf ...