The dissect_rsvp_common function in epan/dissectors/packet-rsvp.c in the RSVP dissector in Wireshark 1.12.x prior to 1.12.9 and 2.0.x prior to 2.0.1 does not properly maintain request-key data, which allows remote malicious users to cause a denial of service (use-after-free and application crash) via a crafted packet.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
wireshark wireshark 2.0.0 |
||
wireshark wireshark 1.12.4 |
||
wireshark wireshark 1.12.5 |
||
wireshark wireshark 1.12.0 |
||
wireshark wireshark 1.12.2 |
||
wireshark wireshark 1.12.1 |
||
wireshark wireshark 1.12.7 |
||
wireshark wireshark 1.12.6 |
||
wireshark wireshark 1.12.3 |
||
wireshark wireshark 1.12.8 |